共 15 条
[1]
Alharby A, 2005, LECT NOTES COMPUT SC, V3531, P192
[2]
[Anonymous], 2002, P 8 ACM SIGKDD INT C, DOI DOI 10.1145/775047.775101
[3]
[Anonymous], P NSF WORKSH NEXT GE
[4]
Clifton C, 2000, IEEE MILIT COMMUN C, P440, DOI 10.1109/MILCOM.2000.904991
[5]
Ertoz L., 2003, P 2 SIAM INT C DAT M, P1
[6]
He Zengyou, 2005, Computer Science and Information Systems, V2, P103, DOI DOI 10.2298/CSIS0501103H
[7]
Julisch K., 2003, ACM Transactions on Information and Systems Security, V6, P443, DOI 10.1145/950191.950192
[8]
Mining alarm clusters to improve alarm handling efficiency
[J].
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2001,
:12-21
[9]
LEUSKI A, 2000, P ACM CIKM 01, P33