Back to Results
First PageMeta Content
Computing / Intrusion detection system / Alert correlation / Thresh / Bayesian network / Snort / Intrusion detection system evasion techniques / Computer network security / Software / System software


Reasoning about Complementary Intrusion Evidence∗ Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC
Add to Reading List

Document Date: 2011-11-09 13:25:57


Open Document

File Size: 214,79 KB

Share Result on Facebook
UPDATE