Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Enhancing the Content of the Intrusion Alerts Using Logic Correlation

    To solve the problem of the alert flooding and information semantics in the existing IDS, the approach using the logic correction to enhance the content of the alerts is presented. The Chronicle based on time ...

    Liang-Min Wang, Jian-Feng Ma, Yong-Zhao Zhan in Content Computing (2004)

  2. No Access

    Chapter and Conference Paper

    Availability Analysis and Comparison of Different Intrusion-Tolerant Systems

    Based on the adopted redundancy techniques the intrusion-tolerant systems are classified into three kinds: resource redundancy based systems, complete information redundancy based systems, and partial informat...

    Chao Wang, Jian-Feng Ma in Content Computing (2004)