The Work of Intrusion Detection: Rethinking the Role of Security Analysts
暂无分享,去创建一个
[1] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[2] William Yurcik,et al. Maintaining Perspective on Who Is The Enemy in the Security Systems Administration of Computer Networks , 2003 .
[3] Marc Dacier,et al. Mining intrusion detection alarms for actionable knowledge , 2002, KDD.
[4] Klaus Julisch,et al. Clustering intrusion detection alarms to support root cause analysis , 2003, TSEC.
[5] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[6] Wayne G. Lutters,et al. An Information Visualization Framework for Intrusion Detection , 2004, CHI EA '04.
[7] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[8] Anselm L. Strauss,et al. Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .
[9] John McHugh,et al. Intrusion and intrusion detection , 2001, International Journal of Information Security.
[10] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[11] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[12] A. Strauss. Basics Of Qualitative Research , 1992 .
[13] Deborah A. Frincke,et al. Intrusion and Misuse Detection in Large-Scale Systems , 2002, IEEE Computer Graphics and Applications.
[14] Salvatore J. Stolfo,et al. Adaptive Intrusion Detection: A Data Mining Approach , 2000, Artificial Intelligence Review.
[15] Ben Shneiderman,et al. Readings in information visualization - using vision to think , 1999 .