Network Threat Characterization in Multiple Intrusion Perspectives using Data Mining Technique
暂无分享,去创建一个
[1] Indrajit Ray,et al. Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.
[2] Svein J. Knapskog,et al. Fuzzy Online Risk Assessment for Distributed Intrusion Prediction and Prevention Systems , 2008, Tenth International Conference on Computer Modeling and Simulation (uksim 2008).
[3] J. T. Lochner. The Journal of Defense Software Engineering , 1999 .
[4] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[5] Dong Li,et al. A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction , 2007, Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007).
[6] Bruce Schneier,et al. Toward a secure system engineering methodolgy , 1998, NSPW '98.
[7] Matt Carlson,et al. INTRUSION DETECTION AND PREVENTION SYSTEMS , 2006 .
[8] Ulf Lindqvist,et al. Modeling multistep cyber attacks for scenario recognition , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[9] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[10] Ram Dantu,et al. Classification of Attributes and Behavior in Risk Management Using Bayesian Networks , 2007, 2007 IEEE Intelligence and Security Informatics.
[11] Karen Scarfone,et al. Intrusion Detection and Prevention Systems , 2010, Handbook of Information and Communication Security.
[12] Julia H. Allen,et al. Intrusion Detection 1 : Implementation and Operational Issues , .
[13] Karen A. Scarfone,et al. A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .
[14] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.