1 Brumley D, "Towards Automatic Generation of Vulnerability-Based Signatures" 2-16, 2006
2 Chomicki, J, "Skyline with presorting" 717-719, 2003
3 Viinikka J, "Processing intrusion detection alert aggregates with time series modeling" 312-324, 2009
4 Hassani M, "Network Intrusion Detection using a Secure Ranking of Hidden Outliers" 1-10, 2011
5 Tajbakhsh, R, "Intrusion detection using fuzzy association rules" 9 : 462-469, 2009
6 Treinen J.J, "Finding The Needle: Suppression of False Alarms in Large Intrusion Detection Data Sets" 237-244, 2009
7 Julisch K, "Clustering Intrusion Detection Alarms to Support Root Cause Analysis" 443-471, 2003
8 Bolzoni D, "ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems" (1-12) : 2007
1 Brumley D, "Towards Automatic Generation of Vulnerability-Based Signatures" 2-16, 2006
2 Chomicki, J, "Skyline with presorting" 717-719, 2003
3 Viinikka J, "Processing intrusion detection alert aggregates with time series modeling" 312-324, 2009
4 Hassani M, "Network Intrusion Detection using a Secure Ranking of Hidden Outliers" 1-10, 2011
5 Tajbakhsh, R, "Intrusion detection using fuzzy association rules" 9 : 462-469, 2009
6 Treinen J.J, "Finding The Needle: Suppression of False Alarms in Large Intrusion Detection Data Sets" 237-244, 2009
7 Julisch K, "Clustering Intrusion Detection Alarms to Support Root Cause Analysis" 443-471, 2003
8 Bolzoni D, "ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems" (1-12) : 2007