共 23 条
- [1] Learning attack strategies through mining and correlation of security alarms [J]. 2007 10TH IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009), VOLS 1 AND 2, 2007, : 713 - +
- [2] Network Security Situation Awareness Based on Spatio-temporal Correlation of Alarms [J]. IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
- [3] Network Security Risk Assessment Based on Node Correlation [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
- [4] Putting security in context: Visual correlation of network activity with real-world information [J]. VIZSEC 2007, 2008, : 203 - 220
- [6] Steady state security assessment through two stages neural network approach [J]. PROCEEDINGS OF THE AMERICAN POWER CONFERENCE, VOL 61 - I AND II, 1999, 61 : 935 - 939
- [7] Planning for Regional Water System Sustainability Through Water Resources Security Assessment Under Uncertainties [J]. Water Resources Management, 2018, 32 : 3135 - 3153