-
1
-
-
35148825681
-
-
Fre'de'ric Cuppens. Managing alerts in multi-intrusion detection environment. In: Proceedings 17th annual computer security applications conference, New Orleans; 2001. p. 22e31.
-
Fre'de'ric Cuppens. Managing alerts in multi-intrusion detection environment. In: Proceedings 17th annual computer security applications conference, New Orleans; 2001. p. 22e31.
-
-
-
-
2
-
-
35148821985
-
-
Fre'de'ric Cuppens, Alexandre Mie'ge. Alert correlation in a cooperative intrusion detection framework, In: Proceedings of the 2002 IEEE symposium on security and privacy; 2002, p. 202e15.
-
Fre'de'ric Cuppens, Alexandre Mie'ge. Alert correlation in a cooperative intrusion detection framework, In: Proceedings of the 2002 IEEE symposium on security and privacy; 2002, p. 202e15.
-
-
-
-
3
-
-
35148862289
-
-
Fre'de'ric Cuppens, Fabien Autrel, Alexandre Mie'ge, Salem Benferhat, Correlation in an intrusion detection process, In: Proceedings SE'curite' des communications sur internet (SECI02); 2002, p. 153e71.
-
Fre'de'ric Cuppens, Fabien Autrel, Alexandre Mie'ge, Salem Benferhat, Correlation in an intrusion detection process, In: Proceedings SE'curite' des communications sur internet (SECI02); 2002, p. 153e71.
-
-
-
-
4
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
presented at, Nov 18-22, Washington, DC, United States
-
P. Ning, Y. Cui, and D. S. Reeves, "Constructing attack scenarios through correlation of intrusion alerts," presented at Proceedings of the 9th ACM Conference on Computer and Communications Security, Nov 18-22 2002, Washington, DC, United States, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
5
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
P. Ning, Y. Cui, D. S. Reeves, and D. Xu, "Techniques and tools for analyzing intrusion alerts," ACM Transactions on Information and System Security, vol. 7, pp, 274, 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, pp. 274
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
7
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
Oakland, CA, May
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R., and Wing, J. M., "Automated generation and analysis of attack graphs" in Proceedings of the 2002 IEEE Symposium on Security and Privacy, (Oakland, CA), May 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
8
-
-
14544297015
-
Statistical Causality Analysis of INFOSEC Alert Data
-
presented at
-
W. Lee and X. Qin, "Statistical Causality Analysis of INFOSEC Alert Data," presented at RAID2003.
-
RAID2003
-
-
Lee, W.1
Qin, X.2
-
10
-
-
1542728250
-
Mining sequential patterns
-
9910, IBM Almaden Research Center, San Jose, California, October
-
R. Agrawal and R. Srikant, "Mining sequential patterns," Research Report RJ 9910, IBM Almaden Research Center, San Jose, California, October 1994.
-
(1994)
Research Report RJ
-
-
Agrawal, R.1
Srikant, R.2
|