Computer Science ›› 2006, Vol. 33 ›› Issue (8): 190-194.
Previous Articles Next Articles
Online:
Published:
Abstract: How to effectively find out valuable abnormal behaviors from the numerous alarms and logs produced by all kinds of security products everyday, all of them must be analyzed and the true and non-redundant information should be extracted, which is helpful to
Key words: Alert correlation, Bayesian classifier, Search tree algorithm, Clustering
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I8/190
Cited