Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation
暂无分享,去创建一个
[1] Robert K. Cunningham,et al. Fusing A Heterogeneous Alert Stream Into Scenarios , 2002, Applications of Data Mining in Computer Security.
[2] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[3] Samuel Madden,et al. Continuously adaptive continuous queries over streams , 2002, SIGMOD '02.
[4] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[5] Giovanni Vigna,et al. NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..
[6] David Thomas,et al. The Art in Computer Programming , 2001 .
[7] Witold Litwin,et al. Linear Hashing: A new Algorithm for Files and Tables Addressing , 1980, ICOD.
[8] Sushil Jajodia,et al. Abstraction-based misuse detection: high-level specifications and adaptable strategies , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[9] Peng Ning,et al. Correlating Alerts Using Prerequisites of Intrusions , 2001 .
[10] Jeffrey D. Ullman,et al. Principles Of Database And Knowledge-Base Systems , 1979 .
[11] Sushil Jajodia,et al. Abstraction-based intrusion detection in distributed environments , 2001, TSEC.
[12] Michael J. Franklin,et al. Streaming Queries over Streaming Data , 2002, VLDB.
[13] Jennifer Widom,et al. Database System Implementation , 2000 .
[14] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[15] Marc Dacier,et al. Intrusion detection , 1999, Comput. Networks.
[16] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[17] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[18] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[19] Jeffrey D. Ullman,et al. Principles of Database and Knowledge-Base Systems, Volume II , 1988, Principles of computer science series.
[20] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[21] Peng Ning,et al. Analyzing Intensive Intrusion Alerts via Correlation , 2002, RAID.
[22] Stuart Staniford-Chen,et al. Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..
[23] Peng Ning,et al. An Intrusion Alert Correlator Based on Prerequisites of Intrusions , 2002 .
[24] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[25] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[26] Douglas Comer,et al. Ubiquitous B-Tree , 1979, CSUR.
[27] Frédéric Cuppens,et al. LAMBDA: A Language to Model a Database for Detection of Attacks , 2000, Recent Advances in Intrusion Detection.
[28] Ronald L. Rivest,et al. The Design and Analysis of Computer Algorithms , 1990 .
[29] Jeffrey D. Uuman. Principles of database and knowledge- base systems , 1989 .
[30] Ravi Krishnamurthy,et al. Design of a Memory Resident DBMS , 1985, IEEE Computer Society International Conference.
[31] Sushil Jajodia,et al. Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.