References

Abad, C., J. Taylor, C. Sengul, William Yurcik, Y. Zhou, and K. Rowe (Dec. 2003). “Log Correlation for Intrusion Detection: A Proof of Concept.” In: Proceedings of the 19th Annual Computer Security Applications Conference, pp. 255–264. DOI: 10.1109/CSAC.2003.1254330. (Cit. on p. 286).

Abad, Cristina, Yifan Li, Kiran Lakkaraju, Xiaoxin Yin, and William Yurcik (2004). “Correlation between NetFlow System and Network Views for Intrusion Detection.” In: Workshop on Link Analysis, Counter-terrorism, and Privacy, Held in Conjunction with SDM. (Cit. on p. 286).

Aboba, B. and W. Dixon (Mar. 2004). IPsec-Network Address Translation (NAT) Compatibility Requirements. RFC 3715. http://www.rfc-editor.org/rfc/rfc3715.txt (cit. on p. 95).

Abrams, ...

Get Thinking Security: Stopping Next Year’s Hackers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.