Research of D-S Evidence Method in Network Attack Intention Recognition
暂无分享,去创建一个
[1] Jingmin Wang,et al. Risk Assessment Model of Smart Grid Project Based on Variable Precision RS and LSSVM , 2011 .
[2] Tim Bass,et al. Intrusion detection systems and multisensor data fusion , 2000, CACM.
[3] Klaus Julisch,et al. Mining alarm clusters to improve alarm handling efficiency , 2001, Seventeenth Annual Computer Security Applications Conference.
[4] Peng Ning,et al. Techniques and tools for analyzing intrusion alerts , 2004, TSEC.
[5] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[6] Alan N. Steinberg,et al. Revisions to the JDL data fusion model , 1999, Defense, Security, and Sensing.
[7] Alfonso Valdes,et al. A Mission-Impact-Based Approach to INFOSEC Alarm Correlation , 2002, RAID.
[8] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[9] Wayne G. Lutters,et al. The Work of Intrusion Detection: Rethinking the Role of Security Analysts , 2004, AMCIS.