메뉴 건너뛰기




Volumn , Issue , 2004, Pages 1421-1427

The Work of Intrusion Detection: Rethinking the Role of Security Analysts

Author keywords

expertise; field study; Information security; intrusion detection; socio technical systems

Indexed keywords

EXPERTISE; FIELD STUDIES; HUMAN COMPONENTS; INTRUSION DETECTION SYSTEMS; INTRUSION-DETECTION; ORGANIZATIONAL CHANGE; SECURITIES ANALYSTS; SECURITY INFRASTRUCTURE; SOCIOTECHNICAL SYSTEMS; TECHNICAL TOOLS;

EID: 85139020324     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (54)

References (14)
  • 7
    • 3142623031 scopus 로고    scopus 로고
    • Clustering Intrusion Detection Alarms to Support Root Cause Analysis
    • Julisch, K. (2003) Clustering Intrusion Detection Alarms to Support Root Cause Analysis, ACM Transactions on Information and System Security, 6, 4, 443-471.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 9
    • 0034455983 scopus 로고    scopus 로고
    • Adaptive Intrusion Detection: A Data Mining Approach
    • Lee, W., Stolfo, S. J. and Mok, K. W. (2000) Adaptive Intrusion Detection: A Data Mining Approach, Artificial Intelligence Review, 14, 6, 533-567.
    • (2000) Artificial Intelligence Review , vol.14 , Issue.6 , pp. 533-567
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3
  • 14
    • 85139043293 scopus 로고    scopus 로고
    • Maintaining Perspective on Who Is the Enemy in the Security Systems Administration of Computer Networks, ACM CHI Workshop on System Administrators Are Users
    • Yurcik, W., Barlow, J. and Rosendale, J. (2003) Maintaining Perspective on Who Is the Enemy in the Security Systems Administration of Computer Networks, ACM CHI Workshop on System Administrators Are Users, Too.
    • (2003) Too
    • Yurcik, W.1    Barlow, J.2    Rosendale, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.