2000 journal article

Intrusion-detection for incident-response, using a military battlefield-intelligence process

Computer Networks (Amsterdam, Netherlands : 1999), 34(4), 671–697.

By: J. Yuill, F. Wu, J. Settle, F. Gong, R. Forno, M. Huang, J. Asbery

Source: NC State University Libraries
Added: August 6, 2018

chapter

DecIdUouS: decentralized source identification for network-based intrusions

Chang, H. Y., Narayan, R., Saryor, C., Jou, P., Wu, S. F., Vetter, B. M., … Yuill, J. J. In Integrated network management VI: Distributed management for the networked millennium (pp. 701–714). Piscataway, NJ: IEEE Pub.

By: H. Chang, R. Narayan, C. Saryor, P. Jou, S. Wu, B. Vetter, F. Gong, X. Wang, M. Brown, J. Yuill

Source: NC State University Libraries
Added: August 6, 2018