12.7. References

[]

[] Abbes, T., Bouhoula, A. and Rusinowitch, M. (2004) On the fly pattern matching for intrusion detection with Snort. Annals of Telecommunications, 59, 9–10.

[]

[] Abou El Kalam, A., Baida, R.E., Balbiani, P. et al. (2003) Organization based access control. Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy'03), June.

[]

[] Anderson, J.P. (1980) Computer Security Threat Monitoring and Surveillance, James P. Anderson Company, Fort Washington, Pennsylvania.

[]

[] Anderson, T., Roscoe, T. and Wetherall, D. (2003) Preventing Internet denial-of-service with capabilities. Proceedings of Hotnets-II, November, Cambridge, MA, USA.

[]

[] Bace, R.G. (2000) Intrusion Detection, Macmillan Technical Publishing.

[]

[] Boyd, J. (1986) A Discourse on Winning and Losing: Patterns of Conflict.

[]

[] Chess, D., Palmer, C. and White, S. (2003) Security in an autonomic computing environment. IBM Systems Journal, 42(1).

[]

[] Clark, D., Partridge, C., Ramming, C. and Wroclawski, J. (2003) A knowledge plane for the Internet. Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '03), pp. 3–10, August 25–29, Karlsruhe, Germany.

[]

[] Coit, C.J., Staniford, S. and McAlerney, J. (2001) Towards faster string matching for intrusion detection or exceeding the speed of Snort. DARPA Information Survivability Conference and Exposition, June.

[]

[] Cuppens, F. (2001) ...

Get Cognitive Networks: Towards Self-Aware Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.