共 50 条
- [1] A Privacy-Preserving Multi-step Attack Correlation Algorithm [J]. PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 1389 - 1393
- [2] MAAC: Novel Alert Correlation Method To Detect Multi-step Attack [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 726 - 733
- [3] Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 214 - +
- [4] Privacy-preserving sequential step mining algorithm for multi-step attack correlation [J]. Qinghua Daxue Xuebao, 10 (1427-1434):
- [5] A systematic survey on multi-step attack detection [J]. COMPUTERS & SECURITY, 2018, 76 : 214 - 249
- [7] An Attack Graph-based On-line Multi-step Attack Detector [J]. ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2018,
- [8] Detection algorithm for multi-step attack based on CTPN [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1383 - 1391
- [9] MAD: A Middleware Framework for Multi-Step Attack Detection [J]. 2015 4TH INTERNATIONAL WORKSHOP ON BUILDING ANALYSIS DATASETS AND GATHERING EXPERIENCE RETURNS FOR SECURITY (BADGERS), 2015, : 8 - 15