Author:
Gander Matthias,Felderer Michael,Katt Basel,Breu Ruth
Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Garcia-Teodoro, P., Diaz-Verdejo, J., Macia-Fernandez, G., Vazquez, E.: Anomaly-based Network Intrusion Detection: Techniques, Systems and Challenges. Computers & Security 28(1-2), 18–28 (2009)
2. Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security (2001)
3. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. 41(3), 15:1–15:58 (2009)
4. Eckert, M., Bry, F.: Complex Event Processing, CEP (2009)
5. OMG: Omg uml specification, v2.0 (2005)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Evolution of Security Engineering Artifacts;Transportation Systems and Engineering;2015
2. Evolution of Security Engineering Artifacts;International Journal of Secure Software Engineering;2014-10