![](https://www.pdfsearch.io/img/4995db2036392a36714bd3ee48ed5b08.jpg) Date: 2015-07-12 13:03:46
| | Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science NorAdd to Reading ListSource URL: www.csc.ncsu.eduDownload Document from Source Website File Size: 185,66 KBShare Document on Facebook
|