-
1
-
-
79959999053
-
Network resilience: A systematic approach
-
July
-
P. Smith et al., "Network Resilience: A Systematic Approach," IEEE Commun. Mag., vol. 49, no. 7, July 2011, pp. 88-97.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.7
, pp. 88-97
-
-
Smith, P.1
-
2
-
-
84864267127
-
A framework for the design and evaluation of network resilience management
-
Maui, Hawaii, USA: IEEE Computer Society, April
-
A. Schaeffer-Filho et al., "A Framework for the Design and Evaluation of Network Resilience Management," Proc. 13th IEEE/IFIP Network Operations and Management Symp. (NOMS 2012), Maui, Hawaii, USA: IEEE Computer Society, April 2012, pp. 401-08.
-
(2012)
Proc. 13th IEEE/IFIP Network Operations and Management Symp. (NOMS 2012)
, pp. 401-408
-
-
Schaeffer-Filho, A.1
-
3
-
-
84883482512
-
PReSET: A toolset for the evaluation of network resilience strategies
-
Ghent, Belgium, May
-
A. Schaeffer-Filho et al., "PReSET: A Toolset for the Evaluation of Network Resilience Strategies," Proc. IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), Ghent, Belgium, May 2013, pp. 202-09.
-
(2013)
Proc. IFIP/IEEE International Symposium on Integrated Network Management (IM 2013)
, pp. 202-209
-
-
Schaeffer-Filho, A.1
-
5
-
-
84866662118
-
Statistical causality analysis of infosec alert data
-
ser. Massive Computing, V. Kumar, J. Srivastava, and A. Lazarevic, Eds. Springer
-
W. Lee and X. Qin, "Statistical Causality Analysis of Infosec Alert Data," Managing Cyber Threats, ser. Massive Computing, V. Kumar, J. Srivastava, and A. Lazarevic, Eds. Springer, 2005, vol. 5, pp. 101-27.
-
(2005)
Managing Cyber Threats
, vol.5
, pp. 101-127
-
-
Lee, W.1
Qin, X.2
-
6
-
-
33646899894
-
Real-time analysis of intrusion detection alerts via correlation
-
DOI 10.1016/j.cose.2005.09.004, PII S0167404805001549
-
S. Lee et al., "Realtime Analysis of Intrusion Detection Alerts via Correlation," Computers and Security, vol. 25, no. 3, May 2006, pp. 169-83. (Pubitemid 43796071)
-
(2006)
Computers and Security
, vol.25
, Issue.3
, pp. 169-183
-
-
Lee, S.1
Chung, B.2
Kim, H.3
Lee, Y.4
Park, C.5
Yoon, H.6
-
7
-
-
84874114774
-
Toward a more practical unsupervised anomaly detection system
-
J. Song et al., "Toward a More Practical Unsupervised Anomaly Detection System," Information Sciences, vol. 231, 2013, pp. 4-14.
-
(2013)
Information Sciences
, vol.231
, pp. 4-14
-
-
Song, J.1
-
8
-
-
33751243928
-
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net
-
DOI 10.1016/j.comnet.2006.05.008, PII S1389128606001290
-
D. Yu and D. Frincke, "Improving the Quality of Alerts and Predicting Intruder's Next Goal with Hidden Colored Petri-Net," Computer Networks, vol. 51, no. 3, February 2007, pp. 632-54. (Pubitemid 44792518)
-
(2007)
Computer Networks
, vol.51
, Issue.3
, pp. 632-654
-
-
Yu, D.1
Frincke, D.2
-
10
-
-
0001692662
-
The holt-winters forecasting procedure
-
C. Chatfield, "The Holt-Winters Forecasting Procedure," Journal of the Royal Statistical Society Series C (Applied Statistics), vol. 27, no. 3, 1978, pp. 264-79.
-
(1978)
Journal of the Royal Statistical Society Series C (Applied Statistics)
, vol.27
, Issue.3
, pp. 264-279
-
-
Chatfield, C.1
-
11
-
-
70450216984
-
Policy conflict analysis for diffserv quality of service management
-
M. Charalambides et al., "Policy Conflict Analysis for Diffserv Quality of Service Management," IEEE Trans. Netw. Service Management, vol. 6, no. 1, 2009, pp. 15-30.
-
(2009)
IEEE Trans. Netw. Service Management
, vol.6
, Issue.1
, pp. 15-30
-
-
Charalambides, M.1
|