1 |
Steven T. Eckman, "Translating Snort rules to STATL scenarios", Reliable Software Group Department of Computer Science University of California, In Proc. Recent Advances in Intrusion Detection, 2001
|
2 |
Clifford Kahn, Don Bolinger, Dan Schnakenberg, "Communication in the Common Intrusion Detection Framework v0.7", CIDF Working Group, 1998. 6
|
3 |
윤현철, "에이전트 기반의 침입탐지시스템 분석", 국방과학연구소, 2002.9
|
4 |
IETF, IDWG, "Intrusion Detection Message Exchange Protocol (IDXP)", draft-ietf-idwg-beep-idxp-07, 2002.10
|
5 |
Adam Wierzbicki, Jacek Kalinski, Tomasz Kruszona, "CIDSS : Common Intrusion Detection Signature Standard", Polish-Japanese Institute of Information Technology
|
6 |
IETF Intrusion Detection Workking Group, "Common Intrusion Detection Signature Standard", Reference http://tools.ietf.org, 2009.3
|