Results of classroom enterprise security assessment of five large enterprise networks
Journal of Computing Sciences in Colleges
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
An Information Visualization Framework for Intrusion Detection
CHI '04 Extended Abstracts on Human Factors in Computing Systems
An evaluation technique for network intrusion detection systems
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
On-line update of situation assessment: A generic approach
International Journal of Knowledge-based and Intelligent Engineering Systems - Selected papers from the KES2004 conference
VizSec '08 Proceedings of the 5th international workshop on Visualization for Computer Security
Cooperative Intrusion Detection Model Based on State Transition Analysis
Computer Supported Cooperative Work in Design IV
Using correlation engine and mobile agents for intrusion detection
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
A triangle area based nearest neighbors approach to intrusion detection
Pattern Recognition
Agent-Based real time intrusion detection system against malformed packet attacks
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
Active host information-based abnormal IP address detection
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Methods of automated analysis of vendor specific implementation of stateful-filtration
Proceedings of the Fifth International Conference on Security of Information and Networks
A Cooperative Intrusion Detection Model Based on Granular Computing and Agent Technologies
International Journal of Agent Technologies and Systems
Hi-index | 0.00 |
From the Publisher:Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, Northcutt covers the topic completely, from detect evaluation, analysis, and situation handling, through the theories involved in understanding hackers, intelligence gathering, and coordinated attacks, to an arsenal of preventive and aggressive security measures.