Author:
J. Andrew,Kathrine G. Jaspher W.
Reference19 articles.
1. Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion detection systems. Comput. Netw. 31(8), 805–822 (1999)
2. Sandhu, U.A., Haider, S., Naseer, S., Ateeb, O.U.: A survey of intrusion detection & prevention techniques. In: 2011 International Conference on Information Communication and Management IPCSIT, vol. 16 (2011)
3. Alsubhi, K., Al-Shaer, E., Boutaba, R.: Alert Prioritization in Intrusion Detection Systems
4. Lagzian, S.: Frequent item set mining-based alert correlation for extracting multi-stage attack scenarios. In: IEEE Telecommunications (IST), 2012 Sixth International Symposium, pp. 1010–1014 (2012)
5. Yang, C.C., Ng, T.D.: Analyzing and visualizing web opinion development and social interactions with density-based clustering. In: Proceedings of the International WWW Conference, pp. 1144–1155 (2011)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献