共 50 条
- [1] Novice Threat Model using SIEM System for Threat Assessment [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 72 - 77
- [3] Detection of DoS attack and Zero Day Threat with SIEM [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 1 - 7
- [4] Augmenting the LSA Technique to Evaluate Ubicomp Environments [J]. NEO 2016: RESULTS OF THE NUMERICAL AND EVOLUTIONARY OPTIMIZATION WORKSHOP NEO 2016 AND THE NEO CITIES 2016 WORKSHOP, 2018, 731 : 45 - 64
- [5] LSA: Understanding the Threat of Link-Based Scapegoating Attack in Network Tomography [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (06): : 3670 - 3681
- [6] Risk Identification Method for Cloud Computing Safety based on LSA-GCC and LSA-SAM [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (02): : 227 - 244
- [7] OSPF failure identification based on LSA flooding analysis [J]. 2007 10TH IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009), VOLS 1 AND 2, 2007, : 717 - +
- [9] Enhancing Cloud Security-Proactive Threat Monitoring and Detection Using a SIEM-Based Approach [J]. APPLIED SCIENCES-BASEL, 2023, 13 (22):
- [10] Optimization of OSPF LSA Flooding Process using Clustering Technique [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,