共 38 条
[1]
AHMADINEJAD SH, 2009, IEEE COMP SOC C PUBL, V2, P170
[2]
[Anonymous], 2002, Proceedings of the 9th ACM conference on Computer and communications security, CCS'02, DOI DOI 10.1145/586110.586144
[3]
[Anonymous], 2004, NDSS
[4]
Alarm reduction and correlation in defence of IP networks
[J].
THIRTEENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS,
2004,
:229-234
[5]
Cormen T., 2001, Introduction to Algorithms
[6]
Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
[7]
DAIN O, 2001, ACM WORKSH DAT MIN S, P1
[8]
DAIN OM, 2002, IEEE WORKSH INF ASS, V6, P231
[9]
Datar M, 2002, SIAM PROC S, P635
[10]
DEBAR H, 2001, 4 INT S REC ADV INTR, V2212, P85