참고문헌
- Building Internet Firewalls(second edition) E. D. Zwicky;S. Cooper;D. B. Chapman
- Intrusion Detection-An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response E. Amoroso
- Hacking Exposed: Network Security Secrets and Solutions S Mclure;J. Scambray;G. Kurtz
- Intrusion Detection R. Bace
- Computer & Security v.18 Simulating Cyber Attacks, Defences, and Consequences F. Cohen
- Lecture Notes on Artificial Intelligence Simulation of Network Security with Collaboration among IDS Models Seo, Hee Suk;Cho, Tae Ho
- Proceedings of International conference on Security and Management Modeling and Simulation of Network Security with the Coordination of IDSes and Firewall Seo, Hee Suk;Cho, Tae Ho
- International Journal of Production Research v.36 no.6 A Conceptual Framework for Interactive and Blackboard Based CAPP G. Van Zeir;J. P. Kruth;J. Detand
- International Journal of pattern Recognition and Artificial Intelligence v.7 no.2 Control Heuristics for Scheduling in a Parallel Blackboard System K. Decker;A. Garvey;M. Humphrey;V. R. Lesser
- IJCAI-95 Workshop on Computational Auditory Scene Analysis The IPUS Blackboard Architecture as a Framework for Computational Auditory Scene Analysis F. Klassner;V. R. Lesser;S. H. Nawab
- Object-Oriented Simulation with Hierarchical, Modular Models B. P. Zeigler
- Theory of Modeling and Simulation B. P. Zeigler
- IEEE trans. Syst. Man, Cyber. A v.27 Simulation of Intelligent Hierarchical Flexible Manufacturing: Batch Job Routing in Operation Overlapping T.H. Cho;Bernard P. Zeigler
- IEEE Software A Software Platform for Testing Intrusion Detection Systems N. Puketza;M. Chung;R. Olsson;B. Mukherjee
- Proceedings of the IEEE Symposium on Security and Privacy Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST) U. Lindqvist;P. A. Porras
- Proceedings of the 20th National Information Systems Security Conference EMERALD: Event Monitoring Enabling Responses to anomalous live disturbances P. Porras;P. Neumann
- Technical Report No. 95-008, COAST Group, Dept. of Computer Science, Purdue University Active Defence of a Computer System using Autonomous Agents M. Crosbie;G. Spafford
- Proceedings of the 12th National Computer Security Conference A Summary of computer misuse techniques P. Neumann;D. Parker
- Proceedings of IEEE International Conference on ICON 2000 Policy based access control framework for large networks Duan Haixin;Wu Jianping;Li Xing
- Proceeding of TENCON 2000 On Firewalls Evaluation Criteria Noureldien A. Noureldien;Izzeldin M. Osman
- TCP/IP Protocol Suite B. A. Forouzan
- Proceedings of Command and Control Research and Technology Symposium A Distributed Autonomous-Agent Network-Intrusion Detection and Response System J. Barrus;N. C. Rowe