暂无分享,去创建一个
[1] Scott D. Stoller,et al. Algorithms for mining meaningful roles , 2012, SACMAT '12.
[2] Lior Rokach,et al. Introduction to Recommender Systems Handbook , 2011, Recommender Systems Handbook.
[3] Katherine B Lyons,et al. A Recommender System in the Cyber Defense Domain , 2014 .
[4] Benoit Claise,et al. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information , 2008, RFC.
[5] E. Al-Shaer,et al. Firewall Policy Advisor for anomaly discovery and rule editing , 2003, IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003..
[6] Ehsan Saboori,et al. Automatic firewall rules generator for anomaly detection systems with Apriori algorithm , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[7] Issa M. Khalil,et al. Security Concerns in Cloud Computing , 2013, 2013 10th International Conference on Information Technology: New Generations.
[8] K. Popovic,et al. Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.
[9] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[10] Ehab Al-Shaer,et al. Analysis of Firewall Policy Rules Using Data Mining Techniques , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[11] S. O. Kuyoro,et al. Cloud computing security issues and challenges , 2011 .
[12] Komminist Weldemariam,et al. Early Detection of Security Misconfiguration Vulnerabilities in Web Applications , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[13] Ian Molloy,et al. Generative models for access control policies: applications to role mining over logs with attribution , 2012, SACMAT '12.
[14] Vince Fuller,et al. Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan , 2006, RFC.