References
- Intrusion Detection - An Introduction to Internet Survillance, Correlation, Traps, Trace Back, and Response E. Amoroso
- Intrusion Detection R.Bace
- Proceedings of Command and Control Research and Technology Symposium A Distributed Autonomous-Agent Network-Intrusion Detection and Response System J. Barrus;N. C. Rowe
- Hacking Exposed: Network Security Secrets and Solutions S Mclure;J. Scambray;G. Kurtz
- Network Intrusion Detection - An Analyst's Handbook S. Northcutt
- International Journal of Production Research v.36 no.6 A Conceptual Framework for Interactive and Blackboard Based G. Van Zeir;J. P. Kruth;J. Detand
- Proceedings of the IEEE Symposium on Security and Privacy How to Systematically Classify Intrusions U. Lindqvist;E. Jonsson
- Proceedings of 14th National Computer Security Conference DIDS - Motivation, Architecture, and an Early Prototype S. Snapp;J. Brentano;G. Dias;L. Heberlein;C. Ho;K. Levitt;B. Mukherjee;S. Smaha;T. Grace;D.Teal;D. Mansur
- IEEE Network Cooperating Security Managers: A Peer-Based Intrusion Detection System G. White;E. Fisch;U. Pooch
- Proceedings of the 20th National Information systems securityconference EMERALD: Event Monitoring Enabling Responses to anomalous live disturbances P. Porras;P. Neumann
- Technical Report No. 98-05, COAST Group, Dept. of Computer Science An Architecutre for Intrusion Detection using Autonomous Agents J. Balasubramaniyan;J. Garcia-Fernandez;D.Isacoff;E. spafford;Diego Zamboni
- Proceddings of the 12th National Computer Security Conference A Summary of computer misuse techniques P. Neumann;D. Parker
- 한국시뮬레이션학회 2001년 추계 학술대회 논문집 IDS 성능 향상을 이한 DEVS 모델링 서희석;조대호
- 한국시뮬레이션학회 2001년 추계 학술대회 논문집 침임 탑지 시스템과 침입 차단 시스템의 연동을 통한 네트워크 보안 시뮬레이션 서희석;이용원;조대호
- Object-Oriented Simulation with Hierachical, Modular Models B. P. Zeigler
- Theory of Modelling and Simulation Bernard P. Zeigler(reissued by Krieger, 1985)
- IEEE trans. Syst. Man, Cybern. A v.27 Simulatio of Intellignet Hiearchical Flexible Manufacturing: Batch Job Routing in Operation Overlapping T. H. Cho;Bernard P. Zeigler
- 인터넷 방화벽 구축하기 D.Brent Chapman;Elizabeth D. Zwicky;채규혁(역)
- Proceedings. IEEE International Conferene on ICON 2000 Policy based access control framework for large networks Duan Haixin;Wu Jianping;Li Xing
- Proceeding of Computer software and Applications Conference 23th Annual International On A Protocol and Simulation for Distributed Communicating Firewalls Robert N. Smith;Sourav Bhattacharya
- Proceedings of TENCON 2000 On Firewalls Evaluation Criteria Noureldien A. Noureldien;Izzeldin M. Osman
- Proceeding of Computr Software and Applications Conference 24th Annual International Firewall Security : Policies, Testing and Performance Evaluation Michael R. Lyu;Lorrien K. Y. Lau