1 |
D. Curry and H. Debar, "Intrusion detection message exchange format data model and extensible markup language document type definition", Internet Draft, Feb. 2001.
|
2 |
R. Agrawal, T. Imielinski, and A. Swami. "Mining association rules between sets of items in large databases" In Proceedings of the ACM SIGMOD Conference on Management of Data, pp. 207-216, 1993.
|
3 |
S. Staniford, J. A. Hoagland, and J. M. McAlerney, "Practical automated detection of stealthy portscans", 2000
|
4 |
Moon Sun Shin, EunHee Kim, Keun Ho Ryu," False Alarm Classification Model for Network-based Intrusion Detection System", IDEAL2004, LNCS, SpringerVerlag,
|
5 |
신문선, 류근호, "침입탐지시스템의 성능향상을 위한 오경보 분류 모델 구현", 정보과학회논문지:데이터베이스 2007.
과학기술학회마을
|
6 |
P. Ning and Y. Cui., "An intrusion alert correlator based on prerequisites of intrusions", Technical Report TR-2002-01, Department of Computer Science, North Carolina State Univ., Jan. 2002.
|
7 |
Moon Sun Shin, HoSung Moon, KeunHo Ryu, "Applying Data Mining Techniques to Analyze Alert Data", APWeb2003, LNCS 2642 pp. 193-200, SpringerVerlag.
|
8 |
A. Valdes and K. Skinner, "Probabilistic alert correlation", In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), pages 5468, 2001.
|