-
1
-
-
0003907293
-
-
Indianapolis: Macmillan Technology Publishing
-
R. Bace, Intrusion detection. Indianapolis: Macmillan Technology Publishing, 2000.
-
(2000)
Intrusion detection
-
-
Bace, R.1
-
3
-
-
10444286030
-
Correlation analysis for distributed intrusion alert
-
J. Li and Z. Li, "Correlation analysis for distributed intrusion alert," Journal of Computer Research and Development, vol. 41, pp. 1919-1923, 2004.
-
(2004)
Journal of Computer Research and Development
, vol.41
, pp. 1919-1923
-
-
Li, J.1
Li, Z.2
-
4
-
-
3142632087
-
Tools and techniques for analyzing intrusion alerts
-
P. Ning, Y. Cui, D. S. Reeves, and D. Xu, "Tools and techniques for analyzing intrusion alerts," ACM Trans. on Info. and System Security, vol. 7, no. 2. pp. 273-318, 2004.
-
(2004)
ACM Trans. on Info. and System Security
, vol.7
, Issue.2
, pp. 273-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
5
-
-
79958186026
-
Building attack scenarios through integration of complementary alert correlation methods
-
In the, San Diego, pp
-
P. Ning, D. Xu, C. G. Healey, and R. St. Amant, "Building attack scenarios through integration of complementary alert correlation methods," In the Proc. of the 11th Annual Network and Distributed System Security Symposium. San Diego, pp. 97-111, 2004..
-
(2004)
Proc. of the 11th Annual Network and Distributed System Security Symposium
, pp. 97-111
-
-
Ning, P.1
Xu, D.2
Healey, C.G.3
St. Amant, R.4
-
8
-
-
33646037321
-
Alarm clustering for intrusion detection systems in computer networks
-
P. Roberto, G. Giorgio, and R. Fabio, "Alarm clustering for intrusion detection systems in computer networks," Engineering Applications of Artificial Intelligence, vol.19, pp. 429-438, 2006.
-
(2006)
Engineering Applications of Artificial Intelligence
, vol.19
, pp. 429-438
-
-
Roberto, P.1
Giorgio, G.2
Fabio, R.3
-
10
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
K. Julisch, "Clustering intrusion detection alarms to support root cause analysis," ACM Trans. on Information and System Security, vol. 4, no. 6, pp. 443-471, 2003.
-
(2003)
ACM Trans. on Information and System Security
, vol.4
, Issue.6
, pp. 443-471
-
-
Julisch, K.1
-
12
-
-
84949215209
-
Mining alarm clusters to improve alarm handling efficiency
-
New Orleans, pp
-
K. Julisch, "Mining alarm clusters to improve alarm handling efficiency," In 17th Annual Computer Security Applications Conference. New Orleans, pp. 12-21, 2001.
-
(2001)
17th Annual Computer Security Applications Conference
, pp. 12-21
-
-
Julisch, K.1
-
13
-
-
0000516376
-
Upper and lower probabilities induced by multivalued mapping
-
A. Dempster, "Upper and lower probabilities induced by multivalued mapping," Annals of Mathematical Statistics, vol. 38, no. 2, pp. 325-339, 1967.
-
(1967)
Annals of Mathematical Statistics
, vol.38
, Issue.2
, pp. 325-339
-
-
Dempster, A.1
-
14
-
-
33646754276
-
A network anomaly detector based on the D-S evidence theory
-
J. Zhuge, D. Wang, Y. Chen, Z. Ye, and W. Zou, "A network anomaly detector based on the D-S evidence theory," Journal of Software, vol. 17, no. 3, pp.463-471, 2006.
-
(2006)
Journal of Software
, vol.17
, Issue.3
, pp. 463-471
-
-
Zhuge, J.1
Wang, D.2
Chen, Y.3
Ye, Z.4
Zou, W.5
-
16
-
-
43949089420
-
-
D.Cuiry and Hervé Debar, Intrusion detection message exchange format data model and extensible markup language (xml) document type definition1 IETF. http://www.ietf.org/lid-abstracts.html, 2003.
-
D.Cuiry and Hervé Debar, Intrusion detection message exchange format data model and extensible markup language (xml) document type definition1 IETF. http://www.ietf.org/lid-abstracts.html, 2003.
-
-
-
-
17
-
-
27644509863
-
DARPA intrusion detection scenario specific dataset
-
07
-
MIT Lincoln Lab, 2000 DARPA intrusion detection scenario specific dataset. http://www.ll.mit.edu/IST/ideval/data/2000/2000_data_index.html, 2003. 07.
-
(2000)
-
-
-
18
-
-
43949119726
-
-
ISS, Inc.: RealSecure intrusion detection system. http://www.iss.net.
-
ISS, Inc.: RealSecure intrusion detection system. http://www.iss.net.
-
-
-
-
20
-
-
21144446778
-
A multi-feature correlation redundance elimination of intrusion event
-
J. Gong, H. Mei, Y. Ding, and D. Wei, "A multi-feature correlation redundance elimination of intrusion event," Journal of Southeast University, vol. 35, no. 3, pp. 366-371, 2005.
-
(2005)
Journal of Southeast University
, vol.35
, Issue.3
, pp. 366-371
-
-
Gong, J.1
Mei, H.2
Ding, Y.3
Wei, D.4
|