A Case Study on Converged Security with Event Correlation of Physical and Information Security
暂无分享,去创建一个
[1] Cristina L. Abad,et al. Log correlation for intrusion detection: a proof of concept , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[2] Marc Dacier,et al. A revised taxonomy for intrusion-detection systems , 2000, Ann. des Télécommunications.
[3] Henry Chang,et al. Complex Event Processing using Simple Rule-based Event Correlation Engines for Business Performance Management , 2006, The 8th IEEE International Conference on E-Commerce Technology and The 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services (CEC/EEE'06).
[4] G. Cybenko,et al. Temporal and spatial distributed event correlation for network security , 2004, Proceedings of the 2004 American Control Conference.
[5] G. Jakobson,et al. Alarm correlation , 1993, IEEE Network.
[6] Sean W. Smith,et al. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems , 2008, SEC.
[7] Syed M. Rahman,et al. Convergence of Corporate and Information Security , 2010, ArXiv.
[8] Andreas Abecker,et al. The role of ontologies in autonomic computing systems , 2004, IBM Syst. J..
[9] Yifan Li,et al. VisFlowConnect: netflow visualizations of link relationships for security situational awareness , 2004, VizSEC/DMSEC '04.
[10] Yarden Livnat,et al. A visualization paradigm for network intrusion detection , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[11] Ning Lu,et al. Smart-grid security issues , 2010, IEEE Security & Privacy.
[12] Yue Wang,et al. Design and Implementation of Server Monitoring System Based on SNMP , 2009, 2009 International Joint Conference on Artificial Intelligence.