The Tao of Network Security Monitoring: Beyond Intrusion Detection R Bejtlich Pearson Education, 2004 | 314 | 2004 |
The Practice of Network Security Monitoring: Understanding Incident Detection and Response R Bejtlich No Starch Press, 2013 | 199 | 2013 |
Real Digital Forensics: Computer Security and Incident Response KJ Jones, R Bejtlich, CW Rose Addison-Wesley Professional, 2005 | 175 | 2005 |
Extrusion Detection: Security Monitoring for Internal Intrusions R Bejtlich Addison-Wesley Professional, 2005 | 77 | 2005 |
Network intrusion detection visualization SC Evans, T Markham, R Bejtlich, J Impson, E Steinbrecher US Patent 8,245,301, 2012 | 53 | 2012 |
Network attack visualization and response through intelligent icons SC Evans, TS Markham, R Bejtlich, BG Barnett, BJ Scholz, RJ Mitchell, ... US Patent 8,245,302, 2012 | 22 | 2012 |
El Tao de la monitorización de seguridad en redes: más allá de la detección de intrusiones R Bejtlich Pearson-Prentice Hall, 2005 | 14 | 2005 |
Strategic defence in cyberspace: beyond tools and tactics R Bejtlich, K Geers, RA against Ukraine Cyber War in Perspective: Russian Aggression against Ukraine. Kenneth Geers …, 2015 | 8 | 2015 |
Directions in incident detection and response R Bejtlich, J Steven, G Peterson IEEE Security & Privacy 9 (1), 91-92, 2011 | 5 | 2011 |
CIRT-level response to advanced persistent threat R Bejtlich SANS Forensics Incident Response Summit, 2010 | 5 | 2010 |
Integrating the Network Security Monitoring Model R Bejtlich Sysadmin Magazine. April, 2004 | 5 | 2004 |
Interpreting Network Traffic: A Network Intrusion Detector’s Look at Suspicious Events R Bejtlich Version, 2000 | 5 | 2000 |
Towards Zero-Day Attack Detection through Intelligent Icon Visualization of MDL Model Proximity SC Evans, R Bejtlich, TS Markham, J Impson, E Steinbrecher VizSec, 2008 | 3 | 2008 |
OpenPacket. org: the challenge of a free, public packet capture repository R Bejtlich Proceedings of the 1st ACM workshop on Network data anonymization, 1-2, 2008 | 2 | 2008 |
Military Privatization: A Framework for the 1990s and Beyond RM Bejtlich, GP Hickman JOHN F KENNEDY SCHOOL OF GOVERNMENT CAMBRIDGE MA, 1996 | 1 | 1996 |
The Best of TaoSecurity Blog, Volume 4: Beyond the Blog with Articles, Testimony, and Scholarship R Bejtlich | | 2021 |
The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices R Bejtlich | | 2020 |
The Best of TaoSecurity Blog, Volume 2: Network Security Monitoring, Technical Notes, Research, and China and the Advanced Persistent Threat R Bejtlich | | 2020 |
The Best of TaoSecurity Blog, Volume 1: Milestones, Philosophy and Strategy, Risk, and Advice R Bejtlich | | 2020 |
Network attack visualization and response through intelligent icons SC Evans, TS Markham, R Bejtlich, B Barnett, B Scholz, R Mitchell, W Yan, ... Military Communications Conference, 2009. MILCOM 2009. IEEE, 1-7, 2009 | | 2009 |