Cited By
View all- Xu KXu K(2021)IntroductionNetwork Behavior Analysis10.1007/978-981-16-8325-1_1(1-6)Online publication date: 16-Dec-2021
- Capobianco FGeorge RHuang KJaeger TKrishnamurthy SQian ZPayer MYu PCarvalho MPieters WStobert E(2019)Employing attack graphs for intrusion detectionProceedings of the New Security Paradigms Workshop10.1145/3368860.3368862(16-30)Online publication date: 23-Sep-2019
- Harang RKott A(2017)Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling ApproachIEEE Transactions on Information Forensics and Security10.1109/TIFS.2017.270562912:10(2348-2359)Online publication date: Oct-2017
- Show More Cited By