메뉴 건너뛰기




Volumn , Issue , 2004, Pages 350-359

Correlating intrusion events and building attack scenarios through attack graph distances

Author keywords

[No Author keywords available]

Indexed keywords

FILTER CONSTANT; GRAPH DISTANCES; INTRUSION EVENTS; ONLINE EVENT PROCESSING;

EID: 21644481812     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2004.11     Document Type: Conference Paper
Times cited : (133)

References (15)
  • 9
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher
    • S. Jajodia, S. Noel, B. O'Berry, "Topological Analysis of Network Attack Vulnerability," in Managing Cyber Threats: Issues, Approaches and Challenges, V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher, 2004.
    • (2004) Managing Cyber Threats: Issues, Approaches and Challenges
    • Jajodia, S.1    Noel, S.2    O'Berry, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.