최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Computers & security, v.48, 2015년, pp.35 - 57
Friedberg, I. , Skopik, F. , Settanni, G. , Fiedler, R.
An advanced persistent threat (also known as APT) is a deliberately slow-moving cyberattack that is applied to quietly compromise interconnected information systems without revealing itself. APTs often use a variety of attack methods to get unauthorized system access initially and then gradually spr...
Alperovitch 2011 Revealed: operation shady RAT
Axelsson 2000 Intrusion detection systems: A survey and taxonomy
Comput Fraud Secur Barber 2001 2 14 2001 10.1016/S1361-3723(01)02017-6 Hackers profiled who are they and what are their motivations?
Barto? 118 2012 Dependable networks and services Network anomaly detection: comparison and real-time issues
Netw Secur Brewer 2014 4 5 2014 10.1016/S1353-4858(14)70040-6 Advanced persistent threats: minimising the damage
Comput Fraud Secur Caldwell 2013 1 11 2013 10.1016/S1361-3723(13)70007-1 Spear-phishing: how to spot and mitigate the menace
ACM Comput Surv (CSUR) Chandola 41 3 15 2009 10.1145/1541880.1541882 Anomaly detection: a survey
Softw Eng IEEE Trans Denning 2 222 1987 10.1109/TSE.1987.232894 An intrusion-detection model
Comput Secur Garca-Teodoro 28 12 18 2009 10.1016/j.cose.2008.08.003 Anomaly-based network intrusion detection: techniques, systems and challenges
Commun ACM Ives 47 4 75 2004 10.1145/975817.975820 The domino effect of password reuse
Expert Syst Appl Kim 41 4, Part 2 1690 2014 10.1016/j.eswa.2013.08.066 A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
Comput Secur Kjaerland 25 7 522 2006 10.1016/j.cose.2006.08.004 A taxonomy and comparison of computer security incidents from the commercial and government sectors
Technol Forecast Soc Change Kraemer-Mbula 80 3 541 2013 10.1016/j.techfore.2012.07.002 The cybercrime ecosystem: online innovation in the shadows?
Lee 120 1999 Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on A data mining framework for building intrusion detection models
Li 343 2012 Advances in Artificial Intelligence Anomaly detection via coupled gaussian kernels
McAfee Labs and McAfee Foundstone Professional Services 2010 Protecting your critical assets
ACM Comput Surv Mitchell 46 4 2014 10.1145/2542049 A survey of intrusion detection techniques for cyber-physical systems
Comput Fraud Secur O'Neill 2014 1 16 2014 10.1016/S1361-3723(14)70008-9 The internet of things: do more devices mean more risks?
Comput Netw Patcha 51 12 3448 2007 10.1016/j.comnet.2007.02.001 An overview of anomaly detection techniques: existing solutions and latest technological trends
Sabahi 23 2008 Systems and Networks Communications, 2008. ICSNC'08. 3rd International Conference on Intrusion detection: a survey
Skopik 2013 43 Jahrestagung der Gesellschaft fr Informatik eV (GI) (INFORMATIK 2013) Intrusion detection in distributed systems using finger-printing and massive event correlation
Skopik 2014 5th IEEE Innovative Smart Grid Technologies Conference Dealing with advanced persistent threats in smart grid ict networks
Skopik 2014 12th Annual Conference on Privacy, Security and Trust Semi-synthetic data set generation for security software evaluation
Sommer 305 2010 Security and Privacy (SP), 2010 IEEE Symposium on Outside the closed world: on using machine learning for network intrusion detection
Int J Crit Infrastructure Prot Sood 6 1 28 2013 10.1016/j.ijcip.2013.01.002 Crimeware-as-a-servicea survey of commoditized crimeware in the underground market
Comput Fraud Secur Steer 2014 1 17 2014 10.1016/S1361-3723(14)70009-0 The gaping hole in our security defences
Netw Secur Tankard 2011 8 16 2011 10.1016/S1353-4858(11)70086-1 Advanced persistent threats and how to monitor and deter them
Netw Secur Thomson 2011 11 9 2011 10.1016/S1353-4858(11)70118-0 Apts: a poorly understood challenge
Signal Process IEEE Trans Thottan 51 8 2191 2003 10.1109/TSP.2003.814797 Anomaly detection in ip networks
Comput Secur von Solms 38 0 97 2013 10.1016/j.cose.2013.04.004 From information security to cyber security
Yin volume 2 1298 2004 Multi-events analysis for anomaly intrusion detection
J Comput Sci Coll Yu 28 1 9 2012 A survey of anomaly intrusion detection techniques
Zhang 1 2009 Computer Network and Multimedia Technology, 2009. CNMT 2009. International Symposium on A survey of anomaly detection methods in networks
Zhang vol. 1 231 2009 A network anomaly detection method based on relative entropy theory
Zhao 113 2010 Communications and Intelligence Information Security (ICCIIS), 2010 International Conference on Bayesian statistical inference in machine learning anomaly detection
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.