DETECÇÃO DE INTRUSOS

 

Index >> Bibliografia >> Perguntas

 

Bibliografia

 

[1] ALLEN, Julia; Christie, Alan; Fithen, William; McHugh, John; Pickel, Jed; Stoner, Ed. “State of the Practice of Intrusion Detection Technologies”. Technical Report CMU/SEI-99-TR-028; The Software Engineering Institute, 2005.

[2] MOREIRA, E. S. .“Detecção de intrusões com auxílio de agentes móveis”. Revista Eletrônica de Iniciação Científica, v. 1, n. 2, 2001.

[3] Mukherjee, B.; Heberlein, L.T.; Levitt, K.N.; “Network intrusion detection”; IEEE Network Magazine, Volume 8, Issue 3; California Univ., Davis, CA, USA; 1994.

[4] Wagner, D.; Dean, R.; “Intrusion detection via static analysis”; IEEE Symposium on Security and Privacy; California Univ., Berkeley, CA, USA; 2001.

[5] Spafford, Eugene H.; Zamboni, Diego; “Intrusion detection using autonomous agents”; IEEE Computer Networks Magazine, Volume 34, Issue 4; Center for Education and Research in Information Assurance and Security, Purdue University, USA, 2000.

[6] Amorim, M. E.; Maestrelli, M.; "Sistemas de Detecção de Intrusos"; CAT Informática; CBPF-NT-009/04;

[7] Cornegie Mellon - Software Engineering Institute; http://www.sei.cmu.edu/

[8] Cisco Systems, Inc.; "Deploying Network-Based Intrusion detection"; San Jose, CA, USA; 2004.

[9] Cisco Systems, Inc.; "Deploying Host-Based Intrusion detection"; San Jose, CA, USA; 2004.

[10] Internet Security Systems; "Network- vs. Host-based Intrusion Detection. A Guide to Intrusion Detection Technology"; Atlanta, GA, USA; 1998.

 

[topo]

<< Anterior || Próxima >>