Redes de Computadores I

Referências

[1] McHugh, J.; , "Intrusion and intrusion detection", International Journal of Information Security, Aug. 2001.

[2] Bace, R.; Mell, P.; , "Intrusion detection systems", 2001.

[3] Mazzariello, C.; Oliviero, F.; , "An Autonomic Intrusion Detection System Based on Behavioral Network Engineering" , INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings , vol., no., pp.1-2, 23-29 April 2006.

[4] Hofmeyr, S.A.; Forrest, S.; Somayaji, A.; , "Intrusion detection using sequences of system calls", in J. Comput. Secur. 6, 3 (August 1998), 151-180.

[5] Mo, Y.; Ma, Y.; Xu, L.; , "Design and implementation of intrusion detection based on mobile agents", IT in Medicine and Education, 2008. ITME 2008. IEEE International Symposium on , vol., no., pp.278-281, 12-14 Dec. 2008

[6] IBM Internet Security Systems. Disponível em: < www.iss.net >. Acessado em: 14 jun. 2011

[7] Cisco Intrusion Detection. Disponível em: < www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/index.shtml >. Acessado em: 14 jun. 2011

[8] Tripwire, File Integrity Manager. Disponível em: < www.tripwire.com >. Acessado em: 14 jun. 2011

[9] Snort. Disponível em: < www.snort.org >. Acessado em: 14 jun. 2011

Anterior Topo