:::

詳目顯示

回上一頁
題名:以網路通訊協定為基礎之隱密性通道特徵分析
書刊名:電子商務研究
作者:曹偉駿林宗杰
作者(外文):Tsaur, Woei-jiunnLin, Tzong-jie
出版日期:2006
卷期:4:3
頁次:頁327-343
主題關鍵詞:網路安全木馬程式隱密性通道資料探勘Network securityTrojan horseCovert channelData mining
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:20
期刊論文
1.Forte, D.(2003)。Covert Channels: Covering 'Malicious' Traffic。Network Security,2003(4),16-18。  new window
2.Lampson, B. W.(1973)。A Note on the Confinement Problem。Communications of the ACM,16(10),613-615。  new window
3.Ward, Joe H. Jr.(1963)。Hierarchical Grouping to Optimize an Objective Function。Journal of the American Statistical Association,58(301),236-244。  new window
會議論文
1.陳奕明、游啓勝(2002)。以網路協定爲基礎的隱密性通道其威脅與防制。網際網路安全工程硏討會,1-6。  延伸查詢new window
2.Borders, K.、Prakash, A.。Web Tap: Detecting Covert Web Traffic。11th ACM Conference on Computer and Communications Security,110-120。  new window
3.Mirkovic, J.、Prier, G.、Reiher, P.(2003)。Source-End DDoS Defence。Second IEEE International Symposium,171-178。  new window
4.Moskowitz, I. S.(2003)。Covert Channel and Anonymizing Networks。2003 ACM Workshop on Privacy in the Electronic Society,79-88。  new window
5.MacQueen, J.(1967)。Some Methods for Classification and Analysis of Multivariate Observations。The fifth Berkeley Symposium on Mathematical Statistics and Probability。Berkeley, California:Statistical Laboratory of the University of California。281-297。  new window
學位論文
1.Kamran, A.(2002)。Covert Channel Analysis and Data Hiding in TCP/IP(碩士論文)。University of Toronto。  new window
2.牟善玲(2003)。基於網路通訊協定之隱密性通道偵測之研究(碩士論文)。國立臺灣科技大學。  延伸查詢new window
圖書
1.Vapnik, Vladimir N.(1998)。Statistical Learning Theory。John Wiley and Sons, Inc.。  new window
其他
1.Arne, V.(2000)。ACK Tunneling trojans,http://ntsecurity.nu/papers/acktunneling。  new window
2.Craig, H. R.(1996)。Covert Channels in the TCP/IP Suite,http://www.firstmondav.dk/issues/issue25/rowlandANov.。  new window
3.DARPA Intrusion Detection Evaluation(1998)。1998 DARPA Intrusion Detection Evaluation Data Set Overview,http://www.ll.mit.edu/IST/ideval/data/1998/1998data index.html。  new window
4.Department of Defence(1983)。Department of Defence Trusted Computer System Evaluation Criteria, DoD standard。  new window
5.KDD(1999)。KDD Cup 1999 Data,http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html/。  new window
6.Kieltyka, P.(2002)。ICMP Shell,http://icmpshell.sourceforge.net/。  new window
7.Lars, B.(1967)。HTTP Tunnel,http://www.nocrew.org/software/httptunnel.html/。  new window
8.Mark, O.(2002)。A Discussion of Covert Channels and Steganography,http://www.sans.org/rr/papers/12/678.pdf,。  new window
9.Ofir, A.(2001)。ICMP Usage in Scanning: The Complete Know-how,http://www.svs-security.com/archive/papers/ICMPScanningv3.0.pdf。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE