Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 332-334.doi: 10.11896/j.issn.1002-137X.2016.6A.079
Previous Articles Next Articles
HU Qian, LUO Jun-yong, YIN Mei-juan and QU Xiao-mei
[1] 郭帆,叶继华,余敏.一种分步式IDS告警聚合模型的设计和实现[J].计算机应用研究,2009,6(1):325-330 [2] 刘夏龙.入侵检测告警数据的过滤与聚合技术研究[D].北京:中国科学院研究生院,2012 [3] Andersson D,Fong M,Valdes A.Heterogeneous Sensor Correlation:A Case Study of Live Traffic Analysis[C]∥ Proceeding of Third Ann.IEEE Information Assurance Workshop:IEEE Computer Society.StuartFeldman,MikeUretsky,New York,USA,June 2002:198-207 [4] Valdes A,Skinner K.Adaptive,Model-Based Monitoring for Cyber Attack Detection[C]∥Proceeding of RAID2000 Conf:RAID 2000.2000:204-217 [5] Valdes A,Skinner K.An Approach to Sensor Correlation[C]∥Proceeding of Int’l Symp:Recent Advances in Intrusion Detection:IEEE Computer Society.2000:197-201 [6] Valdes A,Skinner K.Probabilistic alert correlation[C]∥Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001).Davis,CA,USA,2001,London,UK:Springer,2001:54-68 [7] 王源.一种基于Simhash的文本快速去重算法[D].吉林:吉林大学,2014 [8] 张曼等.基于SHA-1 的邮件去重算法[J].计算机工程,2008,34(11):270-272 [9] 黄思斯.基于多 IDS 系统的攻击场景重建方法的研究[D].武汉:华中科技大学,2007 [10] 黄汉永,肖杰,张驹.一种基于Hash函数抽样的数据集流聚类算法[J].计算机系统应用,2009,8(3):73-75 [11] Mit L L.DARPA 2000 intrusion detection evaluation datasets.(2000).http://ideval.ll.mit.edu/2000 index.html [12] Mit L L.DARPA1999 intrusion detection evaluation datasets.(1999).http://www.ll.mit.edu/2st/ideval/data/1999/1999_data_index.html [13] 尹美娟.基于邮件正文的邮箱用户别名抽取[J].计算机科学,2011,8(12):200-202 |
No related articles found! |
|