메뉴 건너뛰기




Volumn 172 AISC, Issue , 2013, Pages 431-442

A system for cyber attack detection using contextual semantics

Author keywords

Context; Context aware Cyber Security; Semantic Networks

Indexed keywords

INTRUSION DETECTION; KNOWLEDGE MANAGEMENT; SEMANTICS;

EID: 84866547240     PISSN: 21945357     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-30867-3_39     Document Type: Conference Paper
Times cited : (12)

References (25)
  • 1
    • 0343417352 scopus 로고
    • Semantic Networks
    • Shapiro, S.C. (ed.) Wiley, New York
    • Sowa, J.: Semantic Networks. In: Shapiro, S.C. (ed.) Encyclopedia of Artificial Intelligence, pp. 1493-1511. Wiley, New York (1992)
    • (1992) Encyclopedia of Artificial Intelligence , pp. 1493-1511
    • Sowa, J.1
  • 3
    • 84947198779 scopus 로고    scopus 로고
    • Knowledge discovery in databases DARPA archive
    • Knowledge discovery in databases DARPA archive. Task Description, http://www.kdd.ics.uci.edu/databases/kddcup99/task.html
    • Task Description
  • 5
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • McHugh, J.: Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3(4), 262-294 (2001)
    • (2001) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 6
    • 34748822627 scopus 로고    scopus 로고
    • Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms
    • Atlanta, USA
    • Kayacik, G., Zincir, A.: Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms. In: IEEE Intelligence and Security Informatics, Atlanta, USA (2005)
    • (2005) IEEE Intelligence and Security Informatics
    • Kayacik, G.1    Zincir, A.2
  • 7
    • 71649094670 scopus 로고    scopus 로고
    • Using Semantic Networks and Context in Search for Relevant Software Engineering Artifacts
    • Spaccapietra, S., Delcambre, L. (eds.) Journal on Data Semantics XIV. Springer, Heidelberg
    • Karabatis, G., Chen, Z., Janeja, V.P., Lobo, T., Advani, M., Lindvall, M., Feldmann, R.L.: Using Semantic Networks and Context in Search for Relevant Software Engineering Artifacts. In: Spaccapietra, S., Delcambre, L. (eds.) Journal on Data Semantics XIV. LNCS, vol. 5880, pp. 74-104. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5880 , pp. 74-104
    • Karabatis, G.1    Chen, Z.2    Janeja, V.P.3    Lobo, T.4    Advani, M.5    Lindvall, M.6    Feldmann, R.L.7
  • 8
    • 0345411509 scopus 로고    scopus 로고
    • Comparison of Similarity Coefficients Based on Rapid Markers in the Common Bean
    • Duarte, J., Dos, S., Melo, L.: Comparison of Similarity Coefficients Based On Rapid Markers In The Common Bean. Genetics and Molecular Biology 22(3), 427-432 (1999)
    • (1999) Genetics and Molecular Biology , vol.22 , Issue.3 , pp. 427-432
    • Duarte, J.1    Dos, S.2    Melo, L.3
  • 23
    • 44249103300 scopus 로고    scopus 로고
    • Using Vulnerability Analysis to Model Attack Scenario for Collaborative Intrusion Detection
    • Liu, X., Xiao, D.: Using Vulnerability Analysis to Model Attack Scenario for Collaborative Intrusion Detection. In: 10th International Conference on Advanced Communication Technology, pp. 1273-1277 (2008)
    • (2008) 10th International Conference on Advanced Communication Technology , pp. 1273-1277
    • Liu, X.1    Xiao, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.