Text
Intrusion detection and correlation: challenges and solutions
Terdapat bibliografi dan indeks.
Table of contents:
1. Introduction
2. Computer security and intrusion detection
3. Alert correlation
4. Alert collection
5. Alert aggregation and verification
6. High-level alert structures
7. Large-scale correlation
8. Evaluation
9. Open issues
10. Conclusions.
No other version available