A Game-Theoretic Approach for Alert Prioritization
暂无分享,去创建一个
Yevgeniy Vorobeychik | Chao Yan | Daniel Fabbri | Aron Laszka | Bradley Malin | Aron Laszka | B. Malin | D. Fabbri | Chao Yan | Yevgeniy Vorobeychik
[1] Andrew P. Moore,et al. Common Sense Guide to Mitigating Insider Threats 4th Edition , 2012 .
[2] Gabriel Maciá-Fernández,et al. A model-based survey of alert correlation techniques , 2013, Comput. Networks.
[3] Eugene H. Spafford,et al. Understanding insiders: An analysis of risk-taking behavior , 2013, Inf. Syst. Frontiers.
[4] Nicolas Christin,et al. Audit Games with Multiple Defender Resources , 2014, AAAI.
[5] Vincent Conitzer,et al. Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..
[6] Daniel Fabbri,et al. Explanation-Based Auditing , 2011, Proc. VLDB Endow..
[7] Neminath Hubballi,et al. False alarm minimization techniques in signature-based intrusion detection systems: A survey , 2014, Comput. Commun..
[8] Dario A Giuse,et al. Integrating best evidence into patient care: a process facilitated by a seamless integration with informatics tools. , 2010, Journal of the Medical Library Association : JMLA.
[9] Nicolas Christin,et al. Audit Games , 2013, IJCAI.
[10] D. Fabbri,et al. Explaining accesses to electronic medical records using diagnosis information , 2013, J. Am. Medical Informatics Assoc..
[11] Lillian Røstad,et al. A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[12] Dawn M. Cappelli,et al. Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector , 2005 .