Analysis of distributed intrusion detection systems using Bayesian methods

Conference Proceedings of the IEEE International …, 2002 - ieeexplore.ieee.org
In computer and network security, standard approaches to intrusion detection and response
attempt to detect and prevent individual attacks. However, it is not the attack but rather the …

[引用][C] Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods

DJ BURROUGHS - Proc. IEEE International Performance Computing …, 2002 - cir.nii.ac.jp
Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods | CiNii Research
CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ移動 論文・データを …

[引用][C] Analysis of distributed intrusion detection systems using-bayesian methods

DJ BURROUGHS, LF WILSON… - … (Phoenix AZ, 3-5 April …, 2002 - pascal-francis.inist.fr
Analysis of distributed intrusion detection systems using-bayesian methods CNRS Inist
Pascal-Francis CNRS Pascal and Francis Bibliographic Databases Simple search Advanced …

Analysis of distributed intrusion detection systems using Bayesian methods

DJ Burroughs, LF Wilson, GV Cybenko - Proceedings of the Performance …, 2002 - dl.acm.org
In computer and network security, standard approaches to intrusion detection and response
attempt to detect and prevent individual attacks. However, it is not the attack but rather the …

[PDF][PDF] Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods

DJ Burroughs, LF Wilson, GV Cybenko - scholar.archive.org
In computer and network security, standard approaches to intrusion detection and response
attempt to detect and prevent individual attacks. However, it is not the attack but rather the …

[PDF][PDF] Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods

DJ Burroughs, LF Wilson, GV Cybenko - Citeseer
In computer and network security, standard approaches to intrusion detection and response
attempt to detect and prevent individual attacks. However, it is not the attack but rather the …

Analysis of distributed intrusion detection systems using Bayesian methods

DJ Burroughs, LF Wilson, GV Cybenko - … Conference, 2002. 21st IEEE …, 2002 - computer.org
In computer and network security, standard approaches to intrusion detection and response
attempt to detect and prevent individual attacks. However, it is not the attack but rather the …

[引用][C] Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods

DJ BURROUGHS - … of IEEE International Performance Computing and …, 2002 - cir.nii.ac.jp
Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods | CiNii Research
CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ移動 論文・データを …

[PDF][PDF] Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods

DJ Burroughs, LF Wilson, GV Cybenko - scholar.archive.org
In computer and network security, standard approaches to intrusion detection and response
attempt to detect and prevent individual attacks. However, it is not the attack but rather the …

[引用][C] Analysis of distributed intrusion detection systems using-bayesian methods

DJ BURROUGHS, LF WILSON, GV CYBENKO - … performance, computing, and …, 2002