Exploiting Independent State For Network Intrusion Detection

  • Authors:
  • Robin Sommer;Vern Paxson

  • Affiliations:
  • TU Munchen;ICSI/LBNL

  • Venue:
  • ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

When will we be secure? Nobody knows for surebut it cannot happen before commercial security products and services possess not only enough functionality to satisfy customers' stated needs, but also sufficient assurance of quality, reliability, safety, ...