共 50 条
- [1] Applying alert correlation method in network intrusion detection system [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS, AND INFORMATICS, VOL XVI, PROCEEDINGS, 2004, : 516 - 521
- [2] Alert correlation analysis in intrusion detection [J]. ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2006, 4093 : 1049 - 1056
- [4] Alert correlation in a cooperative intrusion detection framework [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 202 - 215
- [5] Event Correlation for Intrusion Detection Systems [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 133 - 139
- [6] Alert Correlation for Cyber-Manufacturing Intrusion Detection [J]. 47TH SME NORTH AMERICAN MANUFACTURING RESEARCH CONFERENCE (NAMRC 47), 2019, 34 : 820 - 831
- [7] Survey on alert correlation methods in distributed intrusion detection [J]. Jisuanji Gongcheng/Computer Engineering, 2005, 31 (07): : 58 - 59
- [8] TRINETR: An intrusion detection alert management system [J]. THIRTEENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2004, : 235 - 240
- [9] Survey of intrusion-detection alert aggregation and correlation techniques [J]. Jisuanji Yanjiu yu Fazhan, 2006, 1 (1-8):
- [10] An Intrinsic Graphical Signature Based on Alert Correlation Analysis for Intrusion Detection [J]. INTERNATIONAL CONFERENCE ON TECHNOLOGIES AND APPLICATIONS OF ARTIFICIAL INTELLIGENCE (TAAI 2010), 2010, : 102 - 109