An application of information theory to intrusion detection

Fourth IEEE International Workshop on Information …, 2006 - ieeexplore.ieee.org
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system
vulnerabilities, are a serious threat. Defending against them is no easy task, however …

[PDF][PDF] An Application of Information Theory to Intrusion Detection

EE Eiland, LM Liebrock - academia.edu
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system
vulnerabilities, are a serious threat. Defending against them is no easy task, however …

[PDF][PDF] An Application of Information Theory to Intrusion Detection

EE Eiland, LM Liebrock - Citeseer
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system
vulnerabilities, are a serious threat. Defending against them is no easy task, however …

An Application of Information Theory to Intrusion Detection

EE Eiland, LM Liebrock - Proceedings of the Fourth IEEE International …, 2006 - dl.acm.org
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system
vulnerabilities, are a serious threat. Defending against them is no easy task, however …

[PDF][PDF] An Application of Information Theory to Intrusion Detection

EE Eiland, LM Liebrock - scholar.archive.org
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system
vulnerabilities, are a serious threat. Defending against them is no easy task, however …

[PDF][PDF] An Application of Information Theory to Intrusion Detection

EE Eiland, LM Liebrock - researchgate.net
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system
vulnerabilities, are a serious threat. Defending against them is no easy task, however …

An application of information theory to intrusion detection

EE Eiland, LM Liebrock - Fourth IEEE International Workshop on Information … - infona.pl
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system
vulnerabilities, are a serious threat. Defending against them is no easy task, however …

[PDF][PDF] An Application of Information Theory to Intrusion Detection

EE Eiland, LM Liebrock - academia.edu
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system
vulnerabilities, are a serious threat. Defending against them is no easy task, however …