-
1
-
-
44549088300
-
-
J.P. Anderson, Computer Security Threat Monitoring and Surveillance, James P. Anderson Company, Fort Washington, PA, 1980.
-
J.P. Anderson, Computer Security Threat Monitoring and Surveillance, James P. Anderson Company, Fort Washington, PA, 1980.
-
-
-
-
2
-
-
44549085066
-
-
S. Benferhat, G. Brewka, D. Le Berre, On the relationship between qualitative choice logic and possibilistic logic, in: Proc. IPMU'04, Perugia, Italy, Juillet 2004, pp. 951-957.
-
S. Benferhat, G. Brewka, D. Le Berre, On the relationship between qualitative choice logic and possibilistic logic, in: Proc. IPMU'04, Perugia, Italy, Juillet 2004, pp. 951-957.
-
-
-
-
3
-
-
44549087656
-
-
S. Benferhat, D. Dubois, S. Kaci, H. Prade, Bipolar representation and fusion of preferences in the possibilistic logic framework, in: Proc. 8th Internat. Conf. on Principle of Knowledge Representation and Reasoning (KR02), Toulouse, France, 2002, pp. 158-169.
-
S. Benferhat, D. Dubois, S. Kaci, H. Prade, Bipolar representation and fusion of preferences in the possibilistic logic framework, in: Proc. 8th Internat. Conf. on Principle of Knowledge Representation and Reasoning (KR02), Toulouse, France, 2002, pp. 158-169.
-
-
-
-
4
-
-
0041629011
-
A logical representation and fusion of prioritized information based on guaranteed possibility measures: application to the encoding of distance-based merging for classical bases
-
Benferhat S., and Kaci S. A logical representation and fusion of prioritized information based on guaranteed possibility measures: application to the encoding of distance-based merging for classical bases. Artificial Intelligence 148 12 (2003) 291-333
-
(2003)
Artificial Intelligence
, vol.148
, Issue.12
, pp. 291-333
-
-
Benferhat, S.1
Kaci, S.2
-
5
-
-
44549083155
-
-
C. Boutilier, Towards a logic for qualitative decision theory, in: Proc. (KR-94) 1994, pp. 75-86.
-
C. Boutilier, Towards a logic for qualitative decision theory, in: Proc. (KR-94) 1994, pp. 75-86.
-
-
-
-
6
-
-
4344559610
-
CP-nets: a tool for representing and reasoning with conditional ceteris paribus preference statements
-
Boutilier C., Brafman R.I., Domshlak C., Hoos H.H., and Poole D. CP-nets: a tool for representing and reasoning with conditional ceteris paribus preference statements. J. Artificial Intelligence Res. 21 (2004) 135-191
-
(2004)
J. Artificial Intelligence Res.
, vol.21
, pp. 135-191
-
-
Boutilier, C.1
Brafman, R.I.2
Domshlak, C.3
Hoos, H.H.4
Poole, D.5
-
7
-
-
44549083567
-
-
C. Boutilier, R.I. Brafman, H.H. Hoos, D. Poole, Reasoning with conditional ceteris paribus preference statements, in: Proc. UAI-99, Stockholm, Sweden, 1999, pp. 71-80.
-
C. Boutilier, R.I. Brafman, H.H. Hoos, D. Poole, Reasoning with conditional ceteris paribus preference statements, in: Proc. UAI-99, Stockholm, Sweden, 1999, pp. 71-80.
-
-
-
-
8
-
-
0036926274
-
-
G. Brewka, Logic programming with ordered disjunction, in: Proc. 17th National Conf. on Artificial Intelligent (AAAI-02), Edmonton, Canada, 2002, pp. 100-105.
-
G. Brewka, Logic programming with ordered disjunction, in: Proc. 17th National Conf. on Artificial Intelligent (AAAI-02), Edmonton, Canada, 2002, pp. 100-105.
-
-
-
-
10
-
-
77952060555
-
-
G. Brewka, I. Niemela, T. Syrjanen, Implementing ordered disjunction using answer set solvers for normal programs, in: Proc. JELIA, Cosenza, Italy, Springer, Berlin, 2002, pp. 444-455.
-
G. Brewka, I. Niemela, T. Syrjanen, Implementing ordered disjunction using answer set solvers for normal programs, in: Proc. JELIA, Cosenza, Italy, Springer, Berlin, 2002, pp. 444-455.
-
-
-
-
12
-
-
84922794799
-
-
F. Cuppens, Managing alerts in a multi-intrusion detection environment, in: Proc. 17th Annu. Computer Security Applications Conference, December 2001, pp. 22-31.
-
F. Cuppens, Managing alerts in a multi-intrusion detection environment, in: Proc. 17th Annu. Computer Security Applications Conference, December 2001, pp. 22-31.
-
-
-
-
13
-
-
0036079912
-
-
F. Cuppens, A. Miege, Alert correlation in a cooperative intrusion detection framework, security and privacy, in: Proc. 2002 IEEE Symp., IEEE, New York, 2002, pp. 202-215.
-
F. Cuppens, A. Miege, Alert correlation in a cooperative intrusion detection framework, security and privacy, in: Proc. 2002 IEEE Symp., IEEE, New York, 2002, pp. 202-215.
-
-
-
-
14
-
-
84944201343
-
-
F. Cuppens, R. Ortalo, Lambda: a language to model a database for detection of attacks, in: Proc. of Recent Advances in Intrusion Detection, 3rd Internat. Symp., (RAID 2000), Toulouse, France, October 2000, pp. 197-216.
-
F. Cuppens, R. Ortalo, Lambda: a language to model a database for detection of attacks, in: Proc. of Recent Advances in Intrusion Detection, 3rd Internat. Symp., (RAID 2000), Toulouse, France, October 2000, pp. 197-216.
-
-
-
-
15
-
-
44549083539
-
-
D. Curry, H. Debar, Intrusion detection message exchange format data model and extensible markup language (XML) document type definition, draft-itetfidwg-idmef-xml-03.txt, February 2001.
-
D. Curry, H. Debar, Intrusion detection message exchange format data model and extensible markup language (XML) document type definition, draft-itetfidwg-idmef-xml-03.txt, February 2001.
-
-
-
-
17
-
-
44549084538
-
-
D. Dubois, S. Kaci, H. Prade, Bipolarity in reasoning and decision-an introduction. The case of the possibility theory framework, in: Proc. of Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference (IPMU'04), Perugia, Italy, Juillet 2004, pp. 959-966.
-
D. Dubois, S. Kaci, H. Prade, Bipolarity in reasoning and decision-an introduction. The case of the possibility theory framework, in: Proc. of Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference (IPMU'04), Perugia, Italy, Juillet 2004, pp. 959-966.
-
-
-
-
18
-
-
0001245395
-
Possibilistic logic
-
Gabbay D., Hogger C.J., and Robinson J.A. (Eds), Oxford University Press, Oxford
-
Dubois D., Lang J., and Prade H. Possibilistic logic. In: Gabbay D., Hogger C.J., and Robinson J.A. (Eds). Handbook of Logic in Artificial Intelligence and Logic Programming, Volume 3: Nonmonotonic Reasoning and Uncertain Reasoning (1994), Oxford University Press, Oxford 439-513
-
(1994)
Handbook of Logic in Artificial Intelligence and Logic Programming, Volume 3: Nonmonotonic Reasoning and Uncertain Reasoning
, pp. 439-513
-
-
Dubois, D.1
Lang, J.2
Prade, H.3
-
19
-
-
77953099209
-
-
D. Dubois, H. Prade, Bipolarity in possibilistic logic and fuzzy rules, in: Proc. of the 29th Conf. on Current Trends in Theory and Practice of Informatics (SOFSEM 2002), Milovy, Czech Republic, 22/11/2002-29/11/2002, Lecture Notes in Computer Science, Vol. 2540, Springer, Berlin, 2002, pp. 168-173.
-
D. Dubois, H. Prade, Bipolarity in possibilistic logic and fuzzy rules, in: Proc. of the 29th Conf. on Current Trends in Theory and Practice of Informatics (SOFSEM 2002), Milovy, Czech Republic, 22/11/2002-29/11/2002, Lecture Notes in Computer Science, Vol. 2540, Springer, Berlin, 2002, pp. 168-173.
-
-
-
-
20
-
-
0036090387
-
STATL: an attack language for state-based intrusion detection
-
Eckmann S.T., Vigna G., and Kemmerer R.A. STATL: an attack language for state-based intrusion detection. J. Comput. Security 10 1-2 (2002) 71-103
-
(2002)
J. Comput. Security
, vol.10
, Issue.1-2
, pp. 71-103
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
21
-
-
0242443267
-
On the revision of preferences and rational inference processes
-
Freund M. On the revision of preferences and rational inference processes. Artificial Intelligence 152 (2004) 105-137
-
(2004)
Artificial Intelligence
, vol.152
, pp. 105-137
-
-
Freund, M.1
-
22
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Julisch K. Clustering intrusion detection alarms to support root cause analysis. ACM Trans. Inform. System Security 6 4 (2003) 443-471
-
(2003)
ACM Trans. Inform. System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
23
-
-
44549088202
-
-
M. Lacroix, P. Lavency, Preferences, putting more knowledge into queries, in: Internat. Conf. on very large Data Bases, 1987, pp. 217-225.
-
M. Lacroix, P. Lavency, Preferences, putting more knowledge into queries, in: Internat. Conf. on very large Data Bases, 1987, pp. 217-225.
-
-
-
-
24
-
-
44549083388
-
-
J. Lang, Conditional desires and utilities: an alternative logical approach to qualitative decision theory, in: Proc. European Conf. on Artificial Intelligence (ECAI 2006), 1996, pp. 318-322.
-
J. Lang, Conditional desires and utilities: an alternative logical approach to qualitative decision theory, in: Proc. European Conf. on Artificial Intelligence (ECAI 2006), 1996, pp. 318-322.
-
-
-
-
26
-
-
44549087519
-
-
MIT Lincoln Laboratory, DARPA intrusion detection evaluation data sets 〈http://www.ll.mit.edu/IST/ideval/data/data_index.html〉.
-
MIT Lincoln Laboratory, DARPA intrusion detection evaluation data sets 〈http://www.ll.mit.edu/IST/ideval/data/data_index.html〉.
-
-
-
-
27
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
ACM Press, Washington, DC, USA
-
Ning P., Cui Y., and Reeves D.S. Constructing attack scenarios through correlation of intrusion alerts. Proc. 9th ACM Conf. on Computer and Communication Security (November 2002), ACM Press, Washington, DC, USA 245-254
-
(2002)
Proc. 9th ACM Conf. on Computer and Communication Security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
28
-
-
84958963784
-
-
P. Ning, Y. Cui, D.S. Reeves, Analyzing intensive intrusion alerts via correlation, in: Proc. 5th Internat. Symp. on Recent Advances in Intrusion Detection (RAID 2002), Lecture Notes in Computer Science, Vol. 2516, Zurich, Switzerland, October 2002, pp. 74-94.
-
P. Ning, Y. Cui, D.S. Reeves, Analyzing intensive intrusion alerts via correlation, in: Proc. 5th Internat. Symp. on Recent Advances in Intrusion Detection (RAID 2002), Lecture Notes in Computer Science, Vol. 2516, Zurich, Switzerland, October 2002, pp. 74-94.
-
-
-
-
29
-
-
84874814342
-
-
M.S. Pini, F. Rossi, K.B. Venable, S. Bistarelli, Bipolar preference problems: framework, properties and solving techniques, Selected Papers from 2006 ERCIM workshop on constraints (Lisbon, June 2006), Springer Lecture Notes in Artificial Intelligence, Vol. 4561, Springer, Berlin, pp. 78-92.
-
M.S. Pini, F. Rossi, K.B. Venable, S. Bistarelli, Bipolar preference problems: framework, properties and solving techniques, Selected Papers from 2006 ERCIM workshop on constraints (Lisbon, June 2006), Springer Lecture Notes in Artificial Intelligence, Vol. 4561, Springer, Berlin, pp. 78-92.
-
-
-
-
32
-
-
0028555756
-
-
S.W. Tan, J. Pearl, Qualitative decision theory, in: Proc. AAAI-94, Seattle, 1994, pp. 928-933.
-
S.W. Tan, J. Pearl, Qualitative decision theory, in: Proc. AAAI-94, Seattle, 1994, pp. 928-933.
-
-
-
-
33
-
-
44549084283
-
-
S.W. Tan, J. Pearl, Specification and evaluation of preferences under uncertainty, in: KR'99, Bonn, 1994, pp. 530-539.
-
S.W. Tan, J. Pearl, Specification and evaluation of preferences under uncertainty, in: KR'99, Bonn, 1994, pp. 530-539.
-
-
-
-
34
-
-
0034593179
-
-
S.J. Templeton, K. Levitt, A require/provides model for computer attacks, in: Proc. 2000 Workshop on New Security Paradigms, February 2001.
-
S.J. Templeton, K. Levitt, A require/provides model for computer attacks, in: Proc. 2000 Workshop on New Security Paradigms, February 2001.
-
-
-
-
35
-
-
44549086410
-
-
A. Valdes, K. Skinner, Probabilistic alert correlation. in: Proc. 4th Internat. Symp. on Recent Advances in Intrusion Detection (RAID 2001), pp. 54-68.
-
A. Valdes, K. Skinner, Probabilistic alert correlation. in: Proc. 4th Internat. Symp. on Recent Advances in Intrusion Detection (RAID 2001), pp. 54-68.
-
-
-
-
37
-
-
44549083926
-
-
M.P. Wellman, J. Doyle, Preferential semantics for goals, in: Proc. of National Conf. on artificial Intelligence, Anaheim, 1991, pp. 698-703.
-
M.P. Wellman, J. Doyle, Preferential semantics for goals, in: Proc. of National Conf. on artificial Intelligence, Anaheim, 1991, pp. 698-703.
-
-
-
-
38
-
-
44549085296
-
-
〈http://www.snort.org/〉.
-
〈http://www.snort.org/〉.
-
-
-
|