Author:
Sapegin Andrey,Jaeger David,Cheng Feng,Meinel Christoph
Subject
Law,General Computer Science
Reference43 articles.
1. A survey of network anomaly detection techniques;Ahmed;J Netw Comput Appl,2016
2. The operational role of security information and event management systems;Bhatt;IEEE Secur Priv,2014
3. Magic quadrant for security information and event management;Bussa,2016
4. Authentication anomaly detection: a case study on a virtual private network;Chapple,2007
5. The incident object description exchange format;Danyliw,2007
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献