咨询与建议

限定检索结果

文献类型

  • 2 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 机械工程
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 物理学

主题

  • 3 篇 distributed even...
  • 1 篇 intrusion detect...
  • 1 篇 insider threats
  • 1 篇 log analysis
  • 1 篇 temporal correla...
  • 1 篇 security inciden...
  • 1 篇 overlay networks
  • 1 篇 multi-layer netw...
  • 1 篇 cloud computing

机构

  • 1 篇 univ naples 2 di...
  • 1 篇 swedish inst com...
  • 1 篇 us air force ins...

作者

  • 1 篇 steinert r.
  • 1 篇 peterson gilbert
  • 1 篇 gillblad d.
  • 1 篇 myers justin
  • 1 篇 gestrelius s.
  • 1 篇 mills robert f.
  • 1 篇 ficco massimo
  • 1 篇 aversa rocco
  • 1 篇 tasquier luca
  • 1 篇 grimaila michael...

语言

  • 3 篇 英文
检索条件"主题词=distributed event correlation"
3 条 记 录,以下是1-10 订阅
排序:
A distributed Spatio-Temporal event correlation Protocol for Multi-Layer Virtual Networks
A Distributed Spatio-Temporal Event Correlation Protocol for...
收藏 引用
54th Annual IEEE Global Telecommunications Conference (GLOBECOM)
作者: Steinert, R. Gestrelius, S. Gillblad, D. Swedish Inst Comp Sci SICS Ind Applicat & Methods Lab IAM SE-16429 Kista Sweden
We present a distributed spatio-temporal event correlation protocol for multi-layer networks. The problems that we address relate to scalability in stacked overlay networks and network equipment with asynchronous cloc... 详细信息
来源: 评论
Design and Analysis of a Dynamically Configured Log-based distributed Security event Detection Methodology
收藏 引用
JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS 2012年 第3期9卷 219-241页
作者: Grimaila, Michael R. Myers, Justin Mills, Robert F. Peterson, Gilbert US Air Force Inst Technol Wright Patterson AFB OH 45433 USA
Military and defense organizations rely upon the security of data stored in, and communicated through, their cyber infrastructure to fulfill their mission objectives. It is essential to identify threats to the cyber i... 详细信息
来源: 评论
Intrusion Detection in Cloud Computing
Intrusion Detection in Cloud Computing
收藏 引用
8th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)
作者: Ficco, Massimo Tasquier, Luca Aversa, Rocco Univ Naples 2 Dipartimento Ingn Ind & Informaz I-81031 Aversa Italy
Cloud Computing represents both a technology for using computing infrastructures in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distribu... 详细信息
来源: 评论