Intrusion detection and the role of the system administrator
暂无分享,去创建一个
[1] Kasia Muldner,et al. Preparation, detection, and analysis: the diagnostic work of IT security incident response , 2010, Inf. Manag. Comput. Secur..
[2] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[3] David Woods,et al. Challenges to adversarial interplay under high uncertainty: staged-world study of a cyber security event , 2011 .
[4] Kasia Muldner,et al. The challenges of using an intrusion detection system: is it worth the effort? , 2008, SOUPS '08.
[5] Marcus J. Ranum. Experiences Benchmarking Intrusion Detection Systems , 2002 .
[6] Teodor Sommestad,et al. Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments , 2012, NordSec.
[7] William Yurcik,et al. Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection , 2007, CHI.
[8] Kasia Muldner,et al. Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents , 2009, HAISA.
[9] Wayne G. Lutters,et al. Developing expertise for network intrusion detection , 2009, Inf. Technol. People.
[10] Meharouech Sourour,et al. Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.
[11] Lucas M. Venter,et al. A comparison of Intrusion Detection systems , 2001, Comput. Secur..
[12] Wayne G. Lutters,et al. I know my network: collaboration and expertise in intrusion detection , 2004, CSCW.
[13] R. Fisher. On the Interpretation of χ 2 from Contingency Tables , and the Calculation of P Author , 2022 .
[14] Richard P. Lippmann,et al. An Overview of Issues in Testing Intrusion Detection Systems , 2003 .
[15] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[16] R. Fisher. On the Interpretation of χ2 from Contingency Tables, and the Calculation of P , 2018, Journal of the Royal Statistical Society Series A (Statistics in Society).
[17] Sokratis K. Katsikas,et al. Reducing false positives in intrusion detection systems , 2010, Comput. Secur..