Author:
Al-Mamory Safaa O.,Zhang Hongli
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Computer Science (miscellaneous)
Reference37 articles.
1. Stefan, A.: The base-rate fallacy and its implications for the intrusion detection. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 1–7. Kent Ridge Digital Labs, Singapore (1999)
2. Pietraszek T., Tanner A.: Data mining and machine learning-towards reducing false positives in intrusion detection. Inf. Secur. Tech. Rep. 10, 169–183 (2005)
3. Yu J., Reddy Y.V.R., Selliah S., Reddy S., Bharadwaj V., kankanahalli S.: TRINETR: an architecture for collaborative intrusion detection and knowledge-based alert evaluation. J. Adv. Eng. Inform. 19, 93–101 (2005)
4. Perdisci R., Giacinto G., Roli F.: Alarm clustering for intrusion detection systems in computer networks. Eng. Appl. Artif. Intell. 19, 429–438 (2006)
5. Julisch K.: Clustering intrusion detection alarms to support root cause analysis. ACM Trans. Inf. Syst. Secur. 6, 443–471 (2003)
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献