Author:
Chen Guanlin,Zhang Yujia,Wang Can
Subject
Artificial Intelligence,Computer Science Applications,General Engineering
Reference15 articles.
1. Cuppens, F., & Miege, A. (2002). Alert correlation in a cooperative intrusion detection framework. In Proceedings of the 2002 IEEE symposium on security and privacy, Oakland, USA.
2. Geib, C. W., & Goldman, R. P. (2001). Plan recognition in intrusion detection systems. In Proceedings of DARPA information survivability conference and exposition (DISCEX II’01), Anaheim, USA.
3. Geib, C. W., & Goldman, R. P. (2001). Probabilistic plan recognition for hostile agents. In Proceedings of the fourteenth international Florida artificial intelligence research society conference, Key West, USA.
4. Discovering actionable patterns in event data;Hellerstein;IBM Systems Journal,2002
5. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection;Kim;Expert Systems with Applications,2014
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献