Intrusion signatures and analysis (2001)

by Stephen Northcutt, Mark Cooper, Matt Fearnow, Karen Frederick