1Ning Ping,Douglas S Reeves,Cui Y.Un correlating alerts using prerequisites of intrusions:[Technical Report TR-2001-13][R].North Carolina State University,Department of Computer Science,Dec.2001:1-19. 被引量:1
2Ning Ping,Cui Yun,Douglas S Reeves.Analyzing intersive intrusion alerts via correlation[C].In:Proc.Of the 5th Intl.Symposium on Recent Advaces in Intrusion Detection (RAID 2002),74-94. 被引量:1
3Xinzhou Qin,Wenke Lee.Statistical causality analysis of infosec alert data[C].In:Proc of the 6th Intl.Symposium on Recent Advances in Intrusion Detection (RAID 2003),73-93. 被引量:1
4Morin Benjamin,Debar Hervé.Correlation of intrusion symptoms:an application of chronicles[C].In:Proc.Of the 6th symposium on Recent Advances in Intrusion Detection (RAID 2003),94-112. 被引量:1
5Aboelela Emad,Douligeris Christos.Fuzzy temporal reasoning model for event correlation in network management[C].Conference on Local Computer Networks,1999,150-159. 被引量:1
6Julisch Klaus.Mining alarm clusters to improve alarm handing efficiency[C].In:Proc.Of the 17th Annual Computer Security Applications Conf.,New Orleans,LA,Dec.2001,12-21. 被引量:1
7Dain Oliver,Cunningham Robert.Fusing a heterogeneous alert stream into scenarios[C].In:Proc.of the 2001 ACM Workshop on Data Mining for Security Applications,2001,231-235. 被引量:1
8Rakesh Agrawal,Ramakrishnan.SrikantFast,fast algorithms for mining association rules in large databases[C].In:Research Report RJ9839,IBM Almaden Research Center,San Jose,CA June 1994,487-499. 被引量:1
9Wang Yun-lan,Li Zeng-zhi.Data fusion supported knowledge discovery methodology for telecommunication network management[C].Computer Engineering and Design,2002,9. 被引量:1