Computer Science ›› 2006, Vol. 33 ›› Issue (8): 190-194.

Previous Articles     Next Articles

  

  • Online:2018-11-17 Published:2018-11-17

Abstract: How to effectively find out valuable abnormal behaviors from the numerous alarms and logs produced by all kinds of security products everyday, all of them must be analyzed and the true and non-redundant information should be extracted, which is helpful to

Key words: Alert correlation, Bayesian classifier, Search tree algorithm, Clustering

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!