[1] W. Metcalf, V. Julien, D. Remien and N. Rogness, “Snort Inline,” http://sourceforge.net/projects/snort-inline/.

[2] Symantec Corp., “Norton Antivirus,” at http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nav2007.

[3] T. Ryutov, C. Neuman, K. Dongho, and Z. Li, “Integrated Access Control and Intrusion Detection for Web Servers,” Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS), Providence, RI, 2003, pp. 394–401.

[4] McAfee Inc., “Internet Security Suite,” at http://us.mcafee.com/root/package.asp?pkgid=272.

[5] I. Balepin, S. Maltsev, J. Rowe, and K. Levitt, “Using Specification-Based Intrusion Detection for Automated Response,” Proceedings of the 6th International Symposium ...

Get Information Assurance now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.