Performing real-time threat assessment of security incidents using data fusion of IDS logs.
Andrew BlythPaula ThomasPublished in: J. Comput. Secur. (2006)
Keyphrases
- data fusion
- real time
- multi sensor
- situation assessment
- intrusion detection
- information fusion
- multi sensor data fusion
- intrusion detection system
- fusion algorithm
- multiple sensors
- source selection
- network security
- multi source
- fusion method
- access control
- situational awareness
- low cost
- security issues
- information security
- control system
- fusion process