Scalable Detection of Cyber Attacks
暂无分享,去创建一个
Sushil Jajodia | V. S. Subrahmanian | Massimiliano Albanese | Andrea Pugliese | S. Jajodia | Andrea Pugliese | Massimiliano Albanese
[1] Svetha Venkatesh,et al. Recognition of human activity through hierarchical stochastic learning , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[2] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[3] Sushil Jajodia,et al. Topological Vulnerability Analysis , 2010, Cyber Situational Awareness.
[4] Wenke Lee,et al. Statistical Causality Analysis of INFOSEC Alert Data , 2003, RAID.
[5] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[6] Robert K. Cunningham,et al. Fusing A Heterogeneous Alert Stream Into Scenarios , 2002, Applications of Data Mining in Computer Security.
[7] Sushil Jajodia,et al. Correlating intrusion events and building attack scenarios through attack graph distances , 2004, 20th Annual Computer Security Applications Conference.
[8] Hila Zarosim,et al. Fast and Complete Symbolic Plan Recognition: Allowing for Duration, Interleaved Execution, and Lossy Observations , 2005 .
[9] Peng Ning,et al. Learning attack strategies from intrusion alerts , 2003, CCS '03.
[10] Sushil Jajodia,et al. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts , 2006, Comput. Commun..
[11] Sushil Jajodia,et al. Cyber Situational Awareness - Issues and Research , 2009, Cyber Situational Awareness.
[12] V. S. Subrahmanian,et al. MAGIC: A Multi-Activity Graph Index for Activity Detection , 2007, 2007 IEEE International Conference on Information Reuse and Integration.
[13] Irfan A. Essa,et al. A novel sequence representation for unsupervised analysis of human activities , 2009, Artif. Intell..
[14] Jean-Jacques Quisquater,et al. Computer Security — ESORICS 92 , 1992, Lecture Notes in Computer Science.
[15] Naji Habra,et al. ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis , 1992, ESORICS.
[16] Svetha Venkatesh,et al. Activity recognition and abnormality detection with the switching hidden semi-Markov model , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).