共 14 条
[1]
Hachmi F(2015)Intrusion detection system based on a two stage alarm correlation to identify outliers and false alerts Lect. Notes Comput. Sci 9468 130-139
[2]
Limam M(2014)Review: False alarm minimization techniques in signature-based intrusion detection systems: A survey Comput. Commun. 49 1-17
[3]
Improved A(2013)Intrusion detection system: a comprehensive review J. Netw. Comput. Appl. 36 16-24
[4]
Hubballi N(2007)A framework for behavior-based detection of user substitution in a mobile context Comput. Secur. 26 154-176
[5]
Suryanarayanan V(2015)RTECA: real time episode correlation algorithm for multi-step attack scenarios detection Comput. Secur. 49 206-219
[6]
Liao HJ(2005)Condition monitoring of 3G cellular networks through competitive neural models IEEE Trans. Neural Netw. 16 1064-1075
[7]
Mazhelis O(2007)Interactive wormhole detection and evaluation Inf. Vis. 6 3-17
[8]
Puuronen S(2010)A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm Comput. Secur. 29 712-723
[9]
Ramaki AA(undefined)undefined undefined undefined undefined-undefined
[10]
Amini M(undefined)undefined undefined undefined undefined-undefined