A Self Adaptive Learning Approach for Optimum Path Evaluation of Process for Forensic use to Finding Uniqueness
暂无分享,去创建一个
[1] Pieter H. Hartel,et al. A log mining approach for process monitoring in SCADA , 2010, International Journal of Information Security.
[2] Thomas Magedanz,et al. Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks , 2009, Int. J. Secur. Networks.
[3] Daisuke Takahashi,et al. Retrieving knowledge from auditing log-files for computer and network forensics and accountability , 2008, Secur. Commun. Networks.
[4] Wil M.P. van der Aalst,et al. Process Mining Put into Context , 2012, IEEE Internet Computing.
[5] D. McDowell. Foreword , 1999 .
[6] Zhenyu Wang,et al. The Research of Process Mining Assessment Used in Business Intelligence , 2012, 2012 IEEE/ACIS 11th International Conference on Computer and Information Science.
[7] Brandon Dixon,et al. Using an edge-dual graph and k-connectivity to identify strong connections in social networks , 2008, ACM-SE 46.
[8] Tzong-Chen Wu,et al. Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks , 2010, Int. J. Secur. Networks.
[9] Wil M. P. van der Aalst,et al. Process mining: making knowledge discovery process centric , 2012, SKDD.
[10] Rafael Accorsi,et al. On the exploitation of process mining for security audits: the conformance checking case , 2012, SAC '12.
[11] Bo Fu,et al. An Implementation Scheme of Flow-Net and Its Applications on Detecting Attacks in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[12] René Mayrhofer,et al. Secure Spontaneous Interaction, Special issue, International Journal of Security and Networks Volume 4 Nos. 1/2 , 2009 .