共 31 条
[1]
Abadi D.J., 2006, P ACM SIGMOD INT C M, P671, DOI [DOI 10.1145/1142473.1142548, 10.1145/1142473.1142548]
[2]
Abadi D.J., 2008, P 2008 ACM SIGMOD IN, P967, DOI DOI 10.1145/1376616.1376712
[3]
[Anonymous], 2002, Proceedings of the 9th ACM conference on Computer and communications security, CCS'02, DOI DOI 10.1145/586110.586144
[4]
[Anonymous], 2005, P 14 C USENIX SECURI
[5]
[Anonymous], 2004, NDSS
[6]
[Anonymous], 2001, Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection, RAID'00, DOI 10.1007/3-540-45474-86
[7]
[Anonymous], 2009, CAUSALITY MODELS REA
[8]
Boncz P, 1999, PROCEEDINGS OF THE TWENTY-FIFTH INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, P54
[9]
Boncz Peter, 2002, Thesis
[10]
Managing alerts in a multi-intrusion detection environment
[J].
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2001,
:22-31