Login / Signup
Constructing attack scenarios through correlation of intrusion alerts.
Peng Ning
Yun Cui
Douglas S. Reeves
Published in:
CCS (2002)
Keyphrases
</>
alert correlation
attack scenarios
intrusion detection
intrusion detection system
attack graph
network security
attack graphs
lightweight
computer networks
real world
data analysis
network traffic
cyber security