메뉴 건너뛰기




Volumn , Issue , 2005, Pages

Network forensics analysis with evidence graphs (demo proposal)

Author keywords

[No Author keywords available]

Indexed keywords

ANALYSIS TOOLS; ATTACK SCENARIOS; AUTOMATED REASONING; AUTOMATED REASONING PROCESS; EVIDENCE ANALYSIS; EVIDENCE GRAPH; GRAPH MODEL; HIERARCHICAL REASONING; LOCAL REASONING; NETWORK FORENSICS; RULE-BASED FUZZY COGNITIVE MAPS; STATE EVOLUTIONS;

EID: 84868384221     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (20)

References (24)
  • 9
  • 14
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Nov
    • K. Julisch. Clustering intrusion detection alarms to support root cause analysis. In ACM Transactions on Information and System Security, pages 443-471, Nov 2003.
    • (2003) ACM Transactions on Information and System Security , pp. 443-471
    • Julisch, K.1
  • 18
    • 10444243686 scopus 로고    scopus 로고
    • Learning attack strategies from intrusion alerts
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • P. Ning and D. Xu. Learning attack stratagies from intrusion alerts. In Proceedings of the 10th ACM Conference on Computer and Communicaitons Security, 200-209, 2003. (Pubitemid 40673802)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 200-209
    • Ning, P.1    Xu, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.