Method and system for reviewing identified threats for performing computer security monitoring

作者: Sudhakar Muddu , Christos Tryfonas

DOI:

关键词:

摘要:

参考文章(55)
Bruce Schneier, Jonathan D. Callas, Andrew H. Gross, Method and system for dynamic network intrusion monitoring, detection and response ,(2001)
Chien-Yi Chiu, Chi-Tien Yeh, Yuh-Jye Lee, Frequent Pattern Based User Behavior Anomaly Detection for Cloud System 2013 Conference on Technologies and Applications of Artificial Intelligence. pp. 61- 66 ,(2013) , 10.1109/TAAI.2013.25
Andy Luse, Kevin P. Scheibe, Anthony M. Townsend, A Component-Based Framework for Visualization of Intrusion Detection Events Information Security Journal: A Global Perspective. ,vol. 17, pp. 95- 107 ,(2008) , 10.1080/19393550802039791
Alfonso Valdes, Keith Skinner, Probabilistic Alert Correlation recent advances in intrusion detection. pp. 54- 68 ,(2001) , 10.1007/3-540-45474-8_4
Craig Anthony Phillips, Derek Patton Pearcy, Jessica Anne Heinrich, Computer system security dashboard ,(2012)
Robert John Hennan, John G. Roane, Security monitoring tool for computer network ,(2006)
Neil Book, Daniel V. Hoffman, Detecting malware on mobile devices ,(2011)