Threat-model-driven runtime adaptation and evaluation of intrusion detection system
暂无分享,去创建一个
Thomas Engel | Michal Pechoucek | Martin Rehák | Eugen Staab | Volker Fusenig | Jan Stiborek | Martin Grill | Karel Bartos | T. Engel | Jan Stiborek | M. Rehák | Eugen Staab | Volker Fusenig | M. Pěchouček | Martin Grill | Karel Bartos
[1] Christos H. Papadimitriou,et al. Computational complexity , 1993 .
[2] Thomas Engel,et al. Towards Trust-Based Acquisition of Unverifiable Information , 2008, CIA.
[3] Willard Van Orman Quine,et al. A Way to Simplify Truth Functions , 1955 .
[4] Michal Pechoucek,et al. Dynamic information source selection for intrusion detection systems , 2009, AAMAS.
[5] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[6] Michal Pechoucek,et al. Trust-Based Classifier Combination for Network Anomaly Detection , 2008, CIA.