Works (2)
2000 journal article
Intrusion-detection for incident-response, using a military battlefield-intelligence process
Computer Networks (Amsterdam, Netherlands : 1999), 34(4), 671–697.
chapter
DecIdUouS: decentralized source identification for network-based intrusions
Chang, H. Y., Narayan, R., Saryor, C., Jou, P., Wu, S. F., Vetter, B. M., … Yuill, J. J. In S. M. M. Sloman & E. Lupu (Eds.), Integrated network management VI: Distributed management for the networked millennium (pp. 701–714). Piscataway, NJ: IEEE Pub.
Ed(s): S. M. Sloman & E. Lupu