1. Liu X , Xiao D. Using Vulnerability Analysis to Model Attack Scenario for Collaborative Intrusion Detection[C]// International Conference on Advanced Communication Technology . IEEE , 2008 . Liu X, Xiao D. Using Vulnerability Analysis to Model Attack Scenario for Collaborative Intrusion Detection[C]// International Conference on Advanced Communication Technology. IEEE, 2008.
2. Kruegel C Robertson W. Alert Verification - Determining the Success of Intrusion Attempts[J]. 2004:1–14. Kruegel C Robertson W. Alert Verification - Determining the Success of Intrusion Attempts[J]. 2004:1–14.
3. Sommer R , Paxson V. Enhancing byte-level network intrusion detection signatures with context[C]// ACM Conference on Computer and Communications Security , CCS 2003 , Washington, Dc, Usa, October. DBLP , 2003 : 262 - 271 . Sommer R, Paxson V. Enhancing byte-level network intrusion detection signatures with context[C]// ACM Conference on Computer and Communications Security, CCS 2003, Washington, Dc, Usa, October. DBLP, 2003:262-271.
4. Multi-stage Attack Recognition System[C]// 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth;Alserhani F;Australia,2010
5. Comprehensive approach to intrusion detection alert correlation