Practical automated detection of stealthy portscans
Journal of Computer Security
Network Security Assessment
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Co-ordinated port scans: a model, a detector and an evaluation methodology
Co-ordinated port scans: a model, a detector and an evaluation methodology
Distributed Evasive Scan Techniques and Countermeasures
DIMVA '07 Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Hi-index | 0.00 |
We have discussed incident response many times in Network Security. The technical tasks (which include many pertinent to computer forensics) are handled mainly with the use of technology based on scientifically established methodologies.