1. Agarwal, M. K., Gupta, M., Kar, G., Neogi, A., & Sailer, A. (2004). Mining activity data for dynamic dependency discovery in e-business systems. IEEE Transactions on Network and Service Management, 1, 49–58.
https://doi.org/10.1109/TNSM.2004.4798290
.
2. Ahmed, M. S., Al-Shaer, E., & Khan, L. (2008). A novel quantitative approach for measuring network security. In: INFOCOM proceedings, Phoenix, AZ, USA, April 2008. IEEE, pp. 1957–1965.
3. ArcSight Enterprise Security Manager (ESM). Security Information and Event Management (SIEM). In: Microfocus Off. website.
https://www.microfocus.com/en-us/products/siem-security-information-event-management/overview
. Accessed 27 Mar 2019.
4. Balepin, I., Maltsev, S., Rowe, J., & Levitt, K. (2003). Using specification-based intrusion detection for automated response. In Proceedings of the sixth international symposium on recent advances in intrusion detection (RAID), Pittsburgh, PA, USA, September 2003. Lecture notes in computer science (LNCS) (Vol. 2820, pp. 136–154). Berlin, Heidelberg: Springer-Verlag.
5. Beliakov, G., Yearwood, J., & Kelarev, A. (2012). Application of rank correlation, clustering and classification in information security. Journal of Networks, 7, 935–945.