Search Results

There are 35497 results for: content related to: Network specific vulnerability based alert reduction approach

  1. An efficient approach to reduce alerts generated by multiple IDS products

    International Journal of Network Management

    Volume 24, Issue 3, May/June 2014, Pages: 153–180, Tu Hoang Nguyen, Jiawei Luo and Humphrey Waita Njogu

    Version of Record online : 21 MAR 2014, DOI: 10.1002/nem.1857

  2. A Bayesian network-based approach for learning attack strategies from intrusion alerts

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 833–853, Fatemeh Kavousi and Behzad Akbari

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.786

  3. A realistic graph-based alert correlation system

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2477–2493, Ouissem Ben Fredj

    Version of Record online : 7 FEB 2015, DOI: 10.1002/sec.1190

  4. A test of intrusion alert filtering based on network information

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2291–2301, Teodor Sommestad and Ulrik Franke

    Version of Record online : 9 JAN 2015, DOI: 10.1002/sec.1173

  5. E-correlator: an entropy-based alert correlation system

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 822–836, Mohammad GhasemiGol and Abbas Ghaemi-Bafghi

    Version of Record online : 18 JUL 2014, DOI: 10.1002/sec.1039

  6. A hierarchical mobile-agent-based security operation center

    International Journal of Communication Systems

    Volume 26, Issue 12, December 2013, Pages: 1503–1519, Jung-Shian Li, Che-Jen Hsieh and Husan-Yeh Lin

    Version of Record online : 28 FEB 2012, DOI: 10.1002/dac.2323

  7. Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2245–2260, Fatemeh Faraji Daneshgar and Maghsoud Abbaspour

    Version of Record online : 15 APR 2016, DOI: 10.1002/sec.1483

  8. Intrusion detection alert management for high-speed networks: current researches and applications

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4362–4372, Hassen Sallay and Sami Bourouis

    Version of Record online : 15 SEP 2015, DOI: 10.1002/sec.1366

  9. CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 10, July 2012, Pages: 1137–1153, Sheng Wen, Wei Zhou, Yang Xiang and Wanlei Zhou

    Version of Record online : 28 APR 2011, DOI: 10.1002/cpe.1747

  10. Discovering anomaly on the basis of flow estimation of alert feature distribution

    Security and Communication Networks

    Volume 7, Issue 10, October 2014, Pages: 1570–1581, Xuejiao Liu, Yingjie Xia, Yanbo Wang and Jing Ren

    Version of Record online : 12 SEP 2013, DOI: 10.1002/sec.855

  11. A survey of IT early warning systems: architectures, challenges, and solutions

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4751–4776, Ali Ahmadian Ramaki and Reza Ebrahimi Atani

    Version of Record online : 27 OCT 2016, DOI: 10.1002/sec.1647

  12. Causal knowledge analysis for detecting and modeling multi-step attacks

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 6042–6065, Ali Ahmadian Ramaki and Abbas Rasoolzadegan

    Version of Record online : 3 FEB 2017, DOI: 10.1002/sec.1756

  13. An optimization process to identify outliers generated by intrusion detection systems

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3469–3480, Fatma Hachmi, Khadouja Boujenfa and Mohamed Limam

    Version of Record online : 1 MAY 2015, DOI: 10.1002/sec.1271

  14. FuzMet: a fuzzy-logic based alert prioritization engine for intrusion detection systems

    International Journal of Network Management

    Volume 22, Issue 4, July/August 2012, Pages: 263–284, Khalid Alsubhi, Issam Aib and Raouf Boutaba

    Version of Record online : 23 SEP 2011, DOI: 10.1002/nem.804

  15. You have free access to this content
    Optimizing the real-time ground level enhancement alert system based on neutron monitor measurements: Introducing GLE Alert Plus

    Space Weather

    Volume 12, Issue 11, November 2014, Pages: 633–649, G. Souvatzoglou, A. Papaioannou, H. Mavromichalaki, J. Dimitroulakos and C. Sarlanis

    Version of Record online : 19 NOV 2014, DOI: 10.1002/2014SW001102

  16. An alert correlation platform for memory-supported techniques

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 10, July 2012, Pages: 1123–1136, Sebastian Roschke, Feng Cheng and Christoph Meinel

    Version of Record online : 2 MAY 2011, DOI: 10.1002/cpe.1750

  17. Drug safety alert generation and overriding in a large Dutch university medical centre

    Pharmacoepidemiology and Drug Safety

    Volume 18, Issue 10, October 2009, Pages: 941–947, Heleen van der Sijs, Alexandra Mulder, Teun van Gelder, Jos Aarts, Marc Berg and Arnold Vulto

    Version of Record online : 3 JUL 2009, DOI: 10.1002/pds.1800

  18. You have free access to this content
    Interactive telemedicine: effects on professional practice and health care outcomes

    Intervention Review

    The Cochrane Library

    Gerd Flodgren, Antoine Rachas, Andrew J Farmer, Marco Inzitari and Sasha Shepperd

    Published Online : 7 SEP 2015, DOI: 10.1002/14651858.CD002098.pub2

  19. Computerized Prescribing Alerts and Group Academic Detailing to Reduce the Use of Potentially Inappropriate Medications in Older People

    Journal of the American Geriatrics Society

    Volume 54, Issue 6, June 2006, Pages: 963–968, Steven R. Simon, David H. Smith, Adrianne C. Feldstein, Nancy Perrin, Xiuhai Yang, Yvonne Zhou, Richard Platt and Stephen B. Soumerai

    Version of Record online : 21 APR 2006, DOI: 10.1111/j.1532-5415.2006.00734.x

  20. A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic

    Security and Communication Networks

    Volume 7, Issue 10, October 2014, Pages: 1612–1621, Sang-soo Choi, Jungsuk Song, Seokhun Kim and Sookyun Kim

    Version of Record online : 24 MAY 2013, DOI: 10.1002/sec.796