共 50 条
- [21] Intrusion Detection Using Data Mining with Correlation [J]. 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 620 - 625
- [22] Managing alerts in a multi-intrusion detection environment [J]. 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 22 - 31
- [24] Deep Learning for Prioritizing and Responding to Intrusion Detection Alerts [J]. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 1 - 5
- [25] An Effecient Method for Evaluating Alerts of Intrusion Detection Systems [J]. 2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
- [27] Analysis and prediction of alerts in perimeter intrusion detection system [J]. Defence Science Journal, 2020, 70 (06): : 619 - 625
- [28] Using data correlation to build an intrusion detection system [J]. RECENT ADVANCES IN AUTOMATION & INFORMATION: PROCEEDINGS OF THE 10TH WSEAS INTERNATIONAL CONFERENCE ON AUTOMATION & INFORMATION (ICAI'09), 2009, : 342 - +
- [29] An incremental intrusion detection model using alarms correlation [J]. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 541 - 562
- [30] Using correlation engine and mobile agents for intrusion detection [J]. PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS , PTS 1-3: NEW ASPECTS OF COMPUTERS, 2008, : 662 - +