[1] W. Metcalf, V. Julien, D. Remien and N. Rogness, “Snort Inline,” http://sourceforge.net/projects/snort-inline/.
[2] Symantec Corp., “Norton Antivirus,” at http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nav2007.
[3] T. Ryutov, C. Neuman, K. Dongho, and Z. Li, “Integrated Access Control and Intrusion Detection for Web Servers,” Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS), Providence, RI, 2003, pp. 394–401.
[4] McAfee Inc., “Internet Security Suite,” at http://us.mcafee.com/root/package.asp?pkgid=272.
[5] I. Balepin, S. Maltsev, J. Rowe, and K. Levitt, “Using Specification-Based Intrusion Detection for Automated Response,” Proceedings of the 6th International Symposium ...
Get Information Assurance now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.