Author:
Li Wang,Zhi-tang Li,Dong Li,Jie Lei
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An effective attack scenario construction model based on identification of attack steps and stages;International Journal of Information Security;2023-05-28
2. A Behavioral Study of Advanced Security Attacks in Enterprise Networks;2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS);2021-12-16
3. Collaborative Alert Ranking for Anomaly Detection;Proceedings of the 27th ACM International Conference on Information and Knowledge Management;2018-10-17
4. A systematic survey on multi-step attack detection;Computers & Security;2018-07
5. Semantic aware attack scenarios reconstruction;Journal of Information Security and Applications;2013-07