Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Enhancing the Content of the Intrusion Alerts Using Logic Correlation
To solve the problem of the alert flooding and information semantics in the existing IDS, the approach using the logic correction to enhance the content of the alerts is presented. The Chronicle based on time ...
-
Chapter and Conference Paper
Availability Analysis and Comparison of Different Intrusion-Tolerant Systems
Based on the adopted redundancy techniques the intrusion-tolerant systems are classified into three kinds: resource redundancy based systems, complete information redundancy based systems, and partial informat...