From post

Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems.

, , и . ISA, том 200 из Communications in Computer and Information Science, стр. 101-110. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Problem of NIDS Evasion in Mobile Networks., , , и . NTMS, стр. 1-6. IEEE, (2011)Data clustering based on correlation analysis applied to highly variable domains., , и . Comput. Networks, 57 (15): 3025-3038 (2013)A Proposal for Parallel Sparse BLAS., , , и . PARA, том 1184 из Lecture Notes in Computer Science, стр. 166-175. Springer, (1996)A symmetric cryptographic scheme for data integrity verification in cloud databases., , , и . Inf. Sci., (2018)Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems., , и . ISA, том 200 из Communications in Computer and Information Science, стр. 101-110. Springer, (2011)Collaborative Attack Detection Using Distributed Hash Tables., , , , и . Collaborative Financial Infrastructure Protection, Springer, (2012)HoneySpam: Honeypots Fighting Spam at the Source., , , и . SRUTI, USENIX Association, (2005)Runtime Prediction Models for Internet-based Systems., , и . MASCOTS, стр. 33-40. IEEE Computer Society, (2008)Security and privacy of location-based services for in-vehicle device systems., , и . HPCS, стр. 841-848. IEEE, (2014)Performance Analysis of Circuit-Switching Interconnection Networks with Deterministic and Adaptive Routing., , и . Perform. Evaluation, 34 (1): 1-26 (1998)