Author:
Husák Martin,Žádník Martin,Bartoš Václav,Sokol Pavol
Funder
European Regional Development Fund
Reference12 articles.
1. Taxonomy and survey of collaborative intrusion detection;Vasilomanolakis;ACM Computing Surveys,2015
2. Detect, SHARE, Protect Solutions for Improving Threat Data Exchange among CERTs;Bourgue,2013
3. Standards and Tools for Exchange and Processing of Actionable Information;Dandurand,2014
4. Alert correlation in collaborative intelligent intrusion detection systems—a survey;Elshoush;Applied Soft Comput,2011
5. Survey of attack projection, prediction, and forecasting in cyber security;Husák;IEEE Communication Surveys & Tutorials,2018
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Introducing a New Alert Data Set for Multi-Step Attack Analysis;Proceedings of the 17th Cyber Security Experimentation and Test Workshop;2024-08-13
2. Situation Projection for enhanced Human-Machine Interaction based on Rule Mining;2024 IEEE 4th International Conference on Human-Machine Systems (ICHMS);2024-05-15
3. Geodemographic Profiling of Malicious IP addresses;2023 20th Annual International Conference on Privacy, Security and Trust (PST);2023-08-21
4. A Comprehensive Survey on Ensemble Machine Learning Approaches for Detection of Intrusion in IoT Networks;2023 International Conference on Innovations in Engineering and Technology (ICIET);2023-07-13
5. Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy;Proceedings of the 17th International Conference on Availability, Reliability and Security;2022-08-23