Streamlined Alarms for Intrusion Recognition System
暂无分享,去创建一个
[1] Christopher Leckie,et al. Decentralized multi-dimensional alert correlation for collaborative intrusion detection , 2009, J. Netw. Comput. Appl..
[2] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[3] Balachander Krishnamurthy,et al. Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites , 2002, WWW.
[4] George Varghese,et al. Automatically inferring patterns of resource consumption in network traffic , 2003, SIGCOMM '03.
[5] M. Hemalatha,et al. Effective approach toward Intrusion Detection System using data mining techniques , 2014 .
[6] Sidi Mohamed Benslimane,et al. Towards Ontological Structures Extraction from Folksonomies: An Efficient Fuzzy Clustering Approach , 2014, Int. J. Intell. Inf. Technol..
[7] Robert B. K. Brown,et al. Towards Intelligent Requirements , 2015, Int. J. Intell. Inf. Technol..
[8] Christopher Leckie,et al. A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..
[9] Andrew Ilachinski,et al. Modelling insurgent and terrorist networks as self-organised complex adaptive systems , 2012, Int. J. Parallel Emergent Distributed Syst..
[10] Andreas Hilbert,et al. Process Model for Content Extraction from Weblogs , 2014, Int. J. Intell. Inf. Technol..
[11] Balachander Krishnamurthy,et al. Collaborating against common enemies , 2005, IMC '05.
[12] Nashat Mansour,et al. Filtering intrusion detection alarms , 2009, Cluster Computing.
[13] Meharouech Sourour,et al. Network Security Alerts Management Architecture for Signature-Based Intrusions Detection Systems within a NAT Environment , 2011 .
[14] John C. S. Lui,et al. Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[15] Shanshan Song,et al. Collaborative Internet Worm Containment , 2005, IEEE Secur. Priv..
[16] Qi Zhang,et al. Indra: a peer-to-peer approach to network intrusion detection and prevention , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..