1 |
D. J. Marchette, Computer Intrusion Detection and Network Monitoring, Springer, New York, 2001.
|
2 |
최윤정, "침입탐지시스템의 정확도 향상을 위한 개선된 데이터마이닝 방법론," 디지털정보산업학회지, 제6권, 제1호, 2010, pp. 1-12.
|
3 |
Alfonso Valdes, "Detecting novel scans through pattern anomaly detection," DARPA Information Survivability Conference and Exposition, 2003.
|
4 |
Yu Liu, Yang Li and Hong Man, "Mac Layer Anonaly Detection in Ad Hoc Networks," Proceedings of the 6th IEEE Information Assurance Workshop, June 17, 2005, pp. 402-409.
|
5 |
Yia-an Huang, Wenke Lee, "A Cooperative Intrusion Detection System for Ad hoc Networks," Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, 2003, pp. 135-147.
|
6 |
Shi Zhong, Taghi M. Khoshgoftaar, and Naeem Seluya, "Evaluating Clustering Techniques for Network Intrusion Detection," In Proceeding of the 10th ISSAT International Conference on Reliability and Quality and Design, 2004, pp. 149-155.
|
7 |
노시춘, "네트워크보안 인프라의 차단구조 설계 방법," 디지털산업정보학회지, 제2권, 제2호, 2006, pp. 9-20.
|
8 |
R. Hixon, D. M. Gruenbacher, "Markov Chains in Network Intrusion Detection," Proceedings of the IEEE Workshop on Information Assurance, United States Military Academy, 2004, pp. 432-433.
|