Date: 2011-11-09 13:26:18Computing Hacking Software testing Alert correlation Attack Alert messaging Buffer overflow Vulnerability Denial-of-service attack Cyberwarfare Computer security Computer network security | | Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomAdd to Reading ListSource URL: discovery.csc.ncsu.eduDownload Document from Source Website File Size: 571,13 KBShare Document on Facebook
|