共 16 条
- [1] Axelsson S., The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security, 3, 3, pp. 186-205, (2000)
- [2] Biermann E., Cloete E., Venter L.M., A comparison of intrusion detection systems, Computers and Security, 20, 8, pp. 676-683, (2001)
- [3] Branlat M., Challenges to Adversarial Interplay under High Uncertainty: Staged-World Study of A Cyber Security Event, (2011)
- [4] Fisher R.A., On the interpretation of chi-square from contingency tables, and the calculation of P, Journal of the Royal Statistical Society, 85, 1, pp. 87-94, (1922)
- [5] Goodall J.R., Lutters W.G., Komlodi A., I know my network: Collaboration and expertise in intrusion detection, Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, pp. 342-345, (2004)
- [6] Goodall J.R., Lutters W.G., Komlodi A., Developing expertise for network intrusion detection, Information Technology & People, 22, 2, pp. 92-108, (2009)
- [7] McHugh J., Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security, 3, 4, pp. 262-294, (2000)
- [8] Mell P., Hu V., Lippmann R., An Overview of Issues in Testing Intrusion Detection Systems, (2003)
- [9] Ranum M.J., Experiences Benchmarking Intrusion Detection Systems, pp. 1-10, (2001)
- [10] Sommestad T., Hallberg J., Cyber Security Exercises and Competitions As A Platform for Cyber Security Experiments, (2012)