Exchanging security events: Which and how many alerts can we aggregate?
Martin HusákMilan CermákMartin LastovickaJan VykopalPublished in: IM (2017)
Keyphrases
- intrusion detection
- intrusion detection system
- event detection
- information security
- network security
- access control
- information assurance
- security vulnerabilities
- security requirements
- security issues
- data mining
- security threats
- cyber security
- computer security
- security management
- security policies
- alert correlation
- contractual obligations
- security problems
- security level
- temporal relationships
- security model
- statistical databases
- news stories
- temporal information
- computer systems
- database systems