Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/im/HusakCLV17
%A Husák, Martin
%A Cermák, Milan
%A Lastovicka, Martin
%A Vykopal, Jan
%B IM
%D 2017
%I IEEE
%K dblp
%P 604-607
%T Exchanging security events: Which and how many alerts can we aggregate?
%U http://dblp.uni-trier.de/db/conf/im/im2017.html#HusakCLV17
%@ 978-3-901882-89-0
@inproceedings{conf/im/HusakCLV17,
added-at = {2019-10-19T00:00:00.000+0200},
author = {Husák, Martin and Cermák, Milan and Lastovicka, Martin and Vykopal, Jan},
biburl = {https://www.bibsonomy.org/bibtex/2cf91550eaf27ebf8210738c35cfdea86/dblp},
booktitle = {IM},
crossref = {conf/im/2017},
ee = {https://doi.org/10.23919/INM.2017.7987340},
interhash = {8c2c23b4c846cc7609fb6c22596849f8},
intrahash = {cf91550eaf27ebf8210738c35cfdea86},
isbn = {978-3-901882-89-0},
keywords = {dblp},
pages = {604-607},
publisher = {IEEE},
timestamp = {2019-10-22T15:51:09.000+0200},
title = {Exchanging security events: Which and how many alerts can we aggregate?},
url = {http://dblp.uni-trier.de/db/conf/im/im2017.html#HusakCLV17},
year = 2017
}