作者: S. Noel , E. Robertson , S. Jajodia
DOI: 10.1109/CSAC.2004.11
关键词: Complex event processing 、 Data mining 、 Attack graph 、 Intrusion 、 Exploit 、 Theoretical computer science 、 Event correlation 、 Lack of knowledge 、 Small number 、 Computer science 、 Correlation
摘要: … Another approach to causal correlation is to represent relationships among events with graphs instead of logical rules. However, because this is still based on intrusion detection …