IDS Alarms Investigation with Limited Resources
暂无分享,去创建一个
Jatinder N. D. Gupta | Ravi Patnayakuni | Ezhil Kalaimannan | J. Gupta | Ravi Patnayakuni | E. Kalaimannan
[1] Young U. Ryu,et al. The management of intrusion detection: Configuration, inspection, and investment , 2009, Eur. J. Oper. Res..
[2] Mohamed Hamdi,et al. A decisional framework system for computer network intrusion detection , 2007, Eur. J. Oper. Res..
[3] Huseyin Cavusoglu,et al. The Value of Intrusion Detection Systems in Information Technology Security Architecture , 2005, Inf. Syst. Res..
[4] Salvatore J. Stolfo,et al. Toward Cost-Sensitive Modeling for Intrusion Detection and Response , 2002, J. Comput. Secur..
[5] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[6] Wayne E. Smith. Various optimizers for single‐stage production , 1956 .