Author:
Cotroneo Domenico,Paudice Andrea,Pecchia Antonio
Funder
TENACE PRIN
Italian Ministry of Education, University and Research
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference39 articles.
1. A virtual honeypot framework;Provos,2004
2. A statistical analysis of attack data to separate attacks;Cukier,2006
3. A. Sharma, Z. Kalbarczyk, J. Barlow, R. Iyer, Analysis of security data from a large computing organization, in: The 41nd IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2011, 2011, pp. 506–517.
4. Identifying compromised users in shared computing infrastructures: A data-driven Bayesian network approach;Pecchia,2011
5. Clustering intrusion detection alarms to support root cause analysis;Julisch;ACM Trans. Inf. Syst. Secur.,2003
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献