1. Automated threat-alert screening for battling alert fatigue with temporal isolation forest;Aminanto,2019
2. A novel kill-chain framework for remote security log analysis with SIEM software;Bryant;Comput. Secur.,2017
3. Attack Subplan-based attack scenario correlation;Chien,2007
4. An intrusion-detection model;Denning;IEEE Trans. Softw. Eng.,1987
5. Activism, Hacktivism, and Cyberterrorism: the internet as a tool for influencing foreign policy;Denning,2001