Author:
Cukier M.,Berthier R.,Panjwani S.,Tan S.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hyper-USS: Answering Subset Query Over Multi-Attribute Data Stream;Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining;2023-08-04
2. Empirical Analysis and Validation of Security Alerts Filtering Techniques;IEEE Transactions on Dependable and Secure Computing;2019-09-01
3. An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets;2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE);2018-08
4. Automated root cause identification of security alerts: Evaluation in a SaaS Cloud;Future Generation Computer Systems;2016-03
5. Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics;2014 28th International Conference on Advanced Information Networking and Applications Workshops;2014-05