Information Technology Reference
In-Depth Information
6. Mansmann, F., Fischer, F., Keim, D.A., North, S.C.: Visual Support for Analyzing
Network Trac and Intrusion Detection Events using TreeMap and Graph Rep-
resentations. In: Proceeding of ACM CHiMitiT 2009, Balitmore, Maryland, pp.
19-28 (2009)
7. Paredes-Oliva, I.: Portscan Detection with Sampled NetFlow. In: Papadopouli, M.,
Owezarski, P., Pras, A. (eds.) TMA 2009. LNCS, vol. 5537, pp. 26-33. Springer,
Heidelberg (2009)
8. Patole, V.A., Pachghare, V.K., Kulkarni, P.: Self Organizing Maps to build Intru-
sion Detection Systems. Journal of Computer Applications 1(8) (2010)
9. Rieck, K.: Machine Learning for Application-layer Intrusion Detection. In: Fraun-
hofer Institute FIRST and Berlin Institute of Technology, Berlin, Germany (2009)
10. Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley Professional, Reading
(2002)
11. Vapnik, V.: Statistical Learning Theory. Wiley, Chichester (1998)
12. Wagner, C., Wagener, G., State, R., Dulaunoy, A., Engel, T.: Game Theory Driven
Monitoring of Spatial-Aggregated IP-Flow Records. In: 6th International Confer-
ence on Network and Services Management, Niagara Falls, Canada (2010)
 
Search WWH ::




Custom Search