Improving the Automation of Security Information Management: A Collaborative Approach
暂无分享,去创建一个
[1] Julien Bourgeois,et al. A Global Security Architecture for Intrusion Detection on Computer Networks , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.
[2] Patrick O'Reilly. Computer Security Division 2009 Annual Report , 2010 .
[3] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[4] Ramakrishna Thurimella,et al. A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures , 2006, RAID.
[5] Hiroki Takakura,et al. A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts , 2007, ASIAN.
[6] Kelly M. Kavanagh,et al. Magic Quadrant for Security Information and Event Management , 2011 .
[7] Xiangliang Zhang,et al. Processing of massive audit data streams for real-time anomaly intrusion detection , 2008, Comput. Commun..
[8] Dong Li,et al. Assessing Attack Threat by the Probability of Following Attacks , 2007, 2007 International Conference on Networking, Architecture, and Storage (NAS 2007).
[9] E. Hooper,et al. Intelligent techniques for network sensor information processing in large-scale network infrastructures , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[10] Rituparna Chaki,et al. Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .