Recognizing Unexplained Behavior in Network Traffic
暂无分享,去创建一个
Sushil Jajodia | Fabio Persia | Cristian Molinaro | V. S. Subrahmanian | Antonio Picariello | Massimiliano Albanese | Robert F. Erbacher | Giancarlo Sperlì | S. Jajodia | R. Erbacher | Fabio Persia | A. Picariello | Cristian Molinaro | Giancarlo Sperlí | Massimiliano Albanese
[1] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[2] Xinzhou Qin,et al. A Probabilistic-Based Framework for INFOSEC Alert Correlation , 2005 .
[3] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[4] Wenke Lee,et al. Statistical Causality Analysis of INFOSEC Alert Data , 2003, RAID.
[5] Sushil Jajodia,et al. Scalable Analysis of Attack Scenarios , 2011, ESORICS.
[6] Song Li,et al. Temporal signatures for intrusion detection , 2001, Seventeenth Annual Computer Security Applications Conference.
[7] Fabio Persia,et al. Finding Top-kappa Unexplained Activities in Video , 2012 .
[8] Hongli Zhang,et al. IDS alerts correlation using grammar-based approach , 2009, Journal in Computer Virology.
[9] Sushil Jajodia,et al. Correlating intrusion events and building attack scenarios through attack graph distances , 2004, 20th Annual Computer Security Applications Conference.
[10] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[11] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[12] Fabio Persia,et al. Finding "Unexplained" Activities in Video , 2011, IJCAI.
[13] Alexander Aiken,et al. Community Epidemic Detection Using Time-Correlated Anomalies , 2010, RAID.
[14] Sushil Jajodia,et al. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts , 2006, Comput. Commun..
[15] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.