Sign in

Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System.

James Bret MichaelThomas C. WingfieldDuminda Wijesekera
Published in: COMPSAC (2003)
Keyphrases
  • cyber attacks
  • attack detection
  • real time
  • data analysis
  • intrusion detection system
  • cyber security
  • alert correlation