International Journal of Man-Machine Studies
Cybersecurity Today and Tomorrow: Pay Now or Pay Later
Cybersecurity Today and Tomorrow: Pay Now or Pay Later
Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9 - Volume 9
Frequent Itemset Mining from Databases Including One Evidential Attribute
SUM '08 Proceedings of the 2nd international conference on Scalable Uncertainty Management
Incremental Maintenance of Frequent Itemsets in Evidential Databases
ECSQARU '09 Proceedings of the 10th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty
Hi-index | 0.00 |
Security analysis of networked computing systems continues to present a challenge. The growing complexity of network and computing systems, the increasing sophistication of computer attacks, and the limited supply of security specialist make automated security solutions a necessity. A number of independent solutions are often suggested for a system and then implemented as independent sensors. Little work has been done in fusing sensor outputs in a meaningful way in order to recognize an attack in progress in time to mitigate its impact.