scientific article; zbMATH DE number 1979428
From MaRDI portal
Publication:4425832
Recommendations
Cited in
(16)- An alert correlation approach based on security operator's knowledge and preferences
- scientific article; zbMATH DE number 1979429 (Why is no real title available?)
- scientific article; zbMATH DE number 1979430 (Why is no real title available?)
- scientific article; zbMATH DE number 1979434 (Why is no real title available?)
- scientific article; zbMATH DE number 1980965 (Why is no real title available?)
- Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net
- IDS False Alarm Reduction Using Continuous and Discontinuous Patterns
- scientific article; zbMATH DE number 2044556 (Why is no real title available?)
- scientific article; zbMATH DE number 2080967 (Why is no real title available?)
- Hidden semi-Markov model for anomaly detection
- Two alternatives for handling preferences in qualitative choice logic
- Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows
- Applied Cryptography and Network Security
- A review of attack graph and attack tree visual syntax in cyber security
- Estimating the number of hosts corresponding to an intrusion alert while preserving privacy
- scientific article; zbMATH DE number 2080965 (Why is no real title available?)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4425832)