Information Technology Reference
In-Depth Information
15. Innerhofer-Oberperfler, F., Breu, R., Hafner, M.: Living security collaborative se-
curity management in a changing world. In: Parallel and Distributed Computing
and Networks/720: Software Engineering. ACTA Press (2011)
16. Mulo, E., Zdun, U., Dustdar, S.: Monitoring web service event trails for business
compliance. In: 2009 IEEE International Conference on Service-Oriented Comput-
ing and Applications (SOCA), pp. 1-8. IEEE (2009)
17. Grohe, S., Schlameu, C., Sommer, R.: Performancevergleich von cep-engines. Tech-
nical report, Hochschulschriftenserver der Universitt Stuttgart, Germany (2010),
http://elib.uni-stuttgart.de/opus/oai2/oai2.php
18. Denning, D.: An intrusion-detection model. IEEE Transactions on Software Engi-
neering (2), 222-232 (1987)
19. Durgin, N.A., Zhang, P.: Profile-based adaptive anomaly detection for network
security (2005)
20. Nicolett, M., Kelly, K.: 2012 Gartner Critical Capabilities and Magic Quadrant for
SIEM (2012)
21. Tan, P., Steinbach, M., Kumar, V.: Cluster Analysis: basic concepts and algo-
rithms. In: Introduction to Data Mining. Addison-Wensley (2006)
22. Finch, H.: Comparison of distance measures in cluster analysis with dichotomous
data. Journal of Data Science 3(1), 85-100 (2005)
23. Ester, M., Kriegel, H., Sander, J., Xu, X.: A density-based algorithm for discov-
ering clusters in large spatial databases with noise. In: Proceedings of the 2nd
International Conference on Knowledge Discovery and Data Mining, vol. 1996, pp.
226-231. AAAI Press (1996)
24. Oldmeadow, J., Ravinutala, S., Leckie, C.: Adaptive clustering for network intru-
sion detection. In: Dai, H., Srikant, R., Zhang, C. (eds.) PAKDD 2004. LNCS
(LNAI), vol. 3056, pp. 255-259. Springer, Heidelberg (2004)
25. Vieira, K., Schulter, A., Westphall, C., Westphall, C.: Intrusion detection for grid
and cloud computing. IT Professional 12(4), 38-43 (2010)
26. Hernandez-Campos, F., Nobel, A., Smith, F., Jeffay, K.: Understanding patterns
of tcp connection usage with statistical clustering. In: 13th IEEE International
Symposium on Modeling, Analysis, and Simulation of Computer and Telecommu-
nication Systems, pp. 35-44. IEEE (2005)
27. Berre, A.: Service oriented architecture modeling language (soaml)-specification
for the uml profile and metamodel for services, upms (2008)
28. van der Aalst, W.: Formalization and verification of event-driven process chains.
Information and Software Technology 41(10), 639-650 (1999)
 
 
Search WWH ::




Custom Search