1 |
中国互联网络信息中心(CNNIC). 第32次中国互联网络发展状况统计报告. , 2013
|
2 |
Percoco N J . Trustwave 2012 Global Security Report. Chicago:Trustware SpiderLabs, 2012
|
3 |
陈观林, 冯雁, 王泽兵 . 分布式无线入侵防御系统预先决策引擎研究. 电信科学, 2010,26(10):80~86
|
4 |
Geib C W , Goldman R P . Plan recognition in intrusion detection systems. Proceedings of DARPA Information Survivability Conference and Exposition(DISCEX IIˊ01), Anaheim,USA, 2001
|
5 |
Geib C W , Goldman R P . Probabilistic plan recognition for hostile agents. Proceedings of the Fourteenth International Florida Artificial Intelligence Research Society Conference (FLAIRS 2001), Key West, USA, 2001
|
6 |
Sheyner O , Haines J , Jha S , et al. Automated generation and analysis of attack graphs. Proceedings of the 2002 IEEE Symposium on Security and Privacy(SP'02), Oakland, USA, 2002
|
7 |
Ning P , Cui Y , Reeves D S . Constructing attack scenarios through correlation of intrusion alerts. Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02), Washington, DC, USA, 2002
|
8 |
Ning P , Cui Y , Reeves D S , et al. Techniques and tools for analyzing intrusion alerts. ACM Transactions on Information and System Security, 2004,7(2): 274~318
|
9 |
Cuppens F , Miège A . Alert correlation in a cooperative intrusion detection framework. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, USA, 2002
|
10 |
Hellerstein J L , Ma S , Perng C S . Discovering actionable patterns in event data. IBM Systems Journal, 2002,41(3): 475~493
|
11 |
Qin X Z , Lee W K . Attack plan recognition and prediction using causal networks. Proceedings of the 20th Annual Computer Security Applications Conference(ACSAC 2004), Tucson, USA, 2004
|
12 |
Wang L , Ghorbani A , Li Y . Automatic multi-step attack pattern discovering. International Journal of Network Security, 2010,10(2): 142~152
|