Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse

来源 :通讯、网络与系统学国际期刊(英文) | 被引量 : 0次 | 上传用户:tcjzy
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishmen
其他文献
<正>与&#39;卡&#39;结缘,是在认识她之后。她,一个为卡&#39;疯狂&#39;的女孩,什么时候都不会忘记向身边的人宣传集卡的好处。我、集卡、她,就这样不知不觉的开始了。这样不经
目的:探讨迟发性维生素K缺乏致颅内出血的CT诊断与预后的关系.方法:对30例婴儿临床资料及CT表现进行回顾性分析.结果:CT表现以蛛网膜下腔出血最多见,亦有硬膜下出血、脑内出
目的:为了提高对急性心肌梗死(AMI)发病的认识和预防。方法:我们观察了110例AMI病人,结果发现,AMI发病的时间、季节有明显的规律性变化。AMI的发生在6-12点为高峰期,且在冬春寒冷季节、节日期间,并在周六
目的:探讨复方丹参及参麦注射液对59例慢性胴源性心脏病急性发作期治疗的影响。方法:在常规西医治疗的基础上加用复方丹参注射液及参麦注射液静脉给药。结果:采用随机分线法分为治
The paper makes a description of the fuzzy filter properties considering its operational principles. A digital filter interacts with a reference model signal in
Spam or unsolicited emails constitute a major threat to the Internet, the corporations, and the end-users. Statistics show that about 70% - 80% of the emails ar
The matching accuracy of the fingerprint templates which were generated by our previously proposed data processing method using the fractional Fourier transform