Computer Science ›› 2006, Vol. 33 ›› Issue (9): 4-7.

Previous Articles     Next Articles

NING Zhuo, GONG Jian (Deparzment of Computer Science and Technology, Southeast University, Nanjing 210096)   

  • Online:2018-11-17 Published:2018-11-17

Abstract: The detection of composed intrusion is an active topic for IDS now. The past researches have shown that intrusion plan recognition technology is critical to reduce false or missed alert rate, tries to construct an effective model to accumulate the relatio

Key words: Composed intrusion, IDS, Plan recognition, Event correlation

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!