Login / Signup
Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts.
Stephen Moskal
Shanchieh Jay Yang
Michael E. Kuhl
Published in:
ISI (2018)
Keyphrases
</>
intrusion detection system
cyber attacks
intrusion detection
cyber security
attack detection
network security
anomaly detection
computer networks
alert correlation
information systems
lightweight
network traffic
information security