-
1
-
-
0004101993
-
-
Wiley
-
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal. Pattern-oriented software architecture, Volume 1: A system of patterns. Wiley, 1996.
-
(1996)
Pattern-Oriented Software Architecture: A System of Patterns
, vol.1
-
-
Buschmann, F.1
Meunier, R.2
Rohnert, H.3
Sommerlad, P.4
Stal, M.5
-
6
-
-
84909619847
-
An innovative framework for collaborative intrusion alert correlation
-
H. Elshoush. An innovative framework for collaborative intrusion alert correlation. In Science and Information Conference (SAI), 2014.
-
(2014)
Science and Information Conference (SAI)
-
-
Elshoush, H.1
-
9
-
-
78349263514
-
Intelligent response system to mitigate the success likelihood of ongoing attacks
-
W. Kanoun, N. Cuppens-Boulahia, F. Cuppens, S. Dubus, and A. Martin. Intelligent response system to mitigate the success likelihood of ongoing attacks. In 6th International Conference on Information Assurance and Security (IAS), 2010.
-
(2010)
6th International Conference on Information Assurance and Security (IAS)
-
-
Kanoun, W.1
Cuppens-Boulahia, N.2
Cuppens, F.3
Dubus, S.4
Martin, A.5
-
10
-
-
84884516336
-
Two complementary patterns to build multi-expert systems
-
P. Lalanda. Two complementary patterns to build multi-expert systems. In Pattern Languages of Programs, 1997.
-
(1997)
Pattern Languages of Programs
-
-
Lalanda, P.1
-
14
-
-
84908408435
-
Developing an ontology of the cyber security domain
-
L. Obrst, P. Chase, and R. Markelo. Developing an ontology of the cyber security domain. In 7th International Conference on Semantic Technologies for Intelligence, Defense, and Security (STIDS), 2012.
-
(2012)
7th International Conference on Semantic Technologies for Intelligence, Defense, and Security (STIDS)
-
-
Obrst, L.1
Chase, P.2
Markelo, R.3
-
17
-
-
0034499251
-
Adaptation techniques for intrusion detection and intrusion response systems
-
D. Ragsdale, C. Carver, J. Humphries, and U. Pooch. Adaptation techniques for intrusion detection and intrusion response systems. In IEEE International Conference on Systems, Man, and Cybernetics, 2000.
-
(2000)
IEEE International Conference on Systems, Man, and Cybernetics
-
-
Ragsdale, D.1
Carver, C.2
Humphries, J.3
Pooch, U.4
-
20
-
-
84908352747
-
Outmet: A new metric for prioritising intrusion alerts using correlation and outlier analysis
-
R. Shittu, A. Healing, R. Ghanea-Hercock, R. Bloomfield, and R. Muttukrishnan. Outmet: A new metric for prioritising intrusion alerts using correlation and outlier analysis. In IEEE 39th Conference on Local Computer Networks (LCN), 2014.
-
(2014)
IEEE 39th Conference on Local Computer Networks (LCN)
-
-
Shittu, R.1
Healing, A.2
Ghanea-Hercock, R.3
Bloomfield, R.4
Muttukrishnan, R.5
-
25
-
-
84962238522
-
Gplmt: A lightweight experimentation and testbed management framework
-
M. Wachs, N. Herold, S.-A. Posselt, F. Dold, and G. Carle. Gplmt: A lightweight experimentation and testbed management framework. In 17th International Conference on Passive and Active Measurement (PAM), 2016.
-
(2016)
17th International Conference on Passive and Active Measurement (PAM)
-
-
Wachs, M.1
Herold, N.2
Posselt, S.-A.3
Dold, F.4
Carle, G.5
-
26
-
-
84901768335
-
Decision algorithm for multi-Agent intelligent decision support system based on blackboard
-
S. Yongyong. Decision algorithm for multi-Agent intelligent decision support system based on blackboard. Information Technology Journal, 2013.
-
(2013)
Information Technology Journal
-
-
Yongyong, S.1
-
27
-
-
70349442571
-
Measuring ids-estimated attack impacts for rational incident response: A decision theoretic approach
-
Z. Zhang, P.-H. Ho, and L. He. Measuring ids-estimated attack impacts for rational incident response: A decision theoretic approach. Computers & Security, 2009.
-
(2009)
Computers & Security
-
-
Zhang, Z.1
Ho, P.-H.2
He, L.3
|