Novelty detection and management to safeguard information-intensive critical infrastructures
暂无分享,去创建一个
[1] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[2] Qiang Yang,et al. ActiveCBR: An Agent System That Integrates Case-Based Reasoning and Active Databases , 2001, Knowledge and Information Systems.
[3] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[4] TERRAN LANE,et al. Temporal sequence learning and data reduction for anomaly detection , 1999, TSEC.
[5] Laura Painton Swiler,et al. A graph-based network-vulnerability analysis system , 1997, S&P 1998.
[6] Michael D. Ernst,et al. Dynamically discovering likely program invariants , 2000 .
[7] James M. Kendra,et al. Creativity in Emergency Response After The World Trade Center Attack , 2002 .
[8] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[9] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[10] Deborah A. Frincke,et al. CONCERNS ABOUT INTRUSIONS INTO REMOTELY ACCESSIBLE SUBSTATION CONTROLLERS AND SCADA SYSTEMS , 2000 .