Author:
Dagon David,Qin Xinzhou,Gu Guofei,Lee Wenke,Grizzard Julian,Levine John,Owen Henry
Publisher
Springer Berlin Heidelberg
Reference49 articles.
1. Anderson, D., Frivold, T., Valdes, A.: Next-generation intrusion detection expert system (NIDES): A summary. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, California (May 1995)
2. Berk, V.H., Gray, R.S., Bakos, G.: Using sensor networks and data fusion for early detection of active worms. In: Proceedings of the SPIE AeroSense (2003)
3. Chen, Z., Gao, L., Kwiat, K.: Modeling the spread of active worms. In: Proceedings of the IEEE INFOCOM 2003 (March 2003)
4. Cheung, S., Lindqvist, U., Fong, M.W.: Modeling multistep cyber attacks for scenario recognition. In: Proceedings of the Third DARPA Information Survivability Conference and Exposition (DISCEX III), Washington, D.C. (April 2003)
5. Cuppens, F., Miège, A.: Alert correlation in a cooperative intrusion detection framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Oakland, CA, May 2002, pp. 202–215 (2002)
Cited by
44 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Honeypot Networks in Deception Technology for IOT Devices;2023 International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT);2023-11-23
2. Challenges on Digital Cyber-Security and Network Forensics: A Survey;Advances on Intelligent Informatics and Computing;2022
3. Learning Generative Deception Strategies in Combinatorial Masking Games;Lecture Notes in Computer Science;2021
4. An Integrated Approach for Botnet Detection and Prediction Using Honeynet and Socialnet Data;International Conference on Intelligent Computing and Smart Communication 2019;2019-12-20
5. A survey on detecting spam accounts on Twitter network;Social Network Analysis and Mining;2019-07-19