Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk
暂无分享,去创建一个
[1] L. Goddard,et al. Operations Research (OR) , 2007 .
[2] Roberto Di Pietro,et al. Intrusion Detection Systems , 2008 .
[3] Robert F. Erbacher,et al. Extending Case-Based Reasoning to Network Alert Reporting , 2012, 2012 International Conference on Cyber Security.
[4] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[5] Shanchieh Jay Yang,et al. Temporal and Spatial Analyses for Large-Scale Cyber Attacks , 2013 .
[6] Hai Yang,et al. ACM Transactions on Intelligent Systems and Technology - Special Section on Urban Computing , 2014 .
[7] Ali Ghorbani,et al. Alert correlation survey: framework and techniques , 2006, PST.
[8] Christopher Krügel,et al. Comprehensive approach to intrusion detection alert correlation , 2004, IEEE Transactions on Dependable and Secure Computing.
[9] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[10] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[11] Anita D. D'Amico,et al. The Real Work of Computer Network Defense Analysts , 2007, VizSEC.
[12] Uwe Fink,et al. Planning And Scheduling In Manufacturing And Services , 2016 .
[13] Sushil Jajodia,et al. Applications of Data Mining in Computer Security , 2002, Advances in Information Security.
[14] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[15] Wayne G. Lutters,et al. I know my network: collaboration and expertise in intrusion detection , 2004, CSCW.
[16] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[17] A. N. Zincir-Heywood,et al. Intrusion Detection Systems , 2008 .
[18] Carl M. Harris,et al. Fundamentals of Queueing Theory: Gross/Fundamentals of Queueing Theory , 2008 .
[19] Marc Dacier,et al. Mining intrusion detection alarms for actionable knowledge , 2002, KDD.