Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Towards Identifying True Threat from Network Security Data

    Among the challenges in the field of network security management, one significant problem is the increasing difficulty in identifying the security incidents which pose true threat to the protected network syst...

    Zhi-tang Li, Jie Lei, Li Wang, Dong Li in Intelligence and Security Informatics (2007)

  2. No Access

    Chapter and Conference Paper

    An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events

    To integrate network security devices to make them act as a battle team and efficiently handle the large amount of security events produced by various network applications, Network Security Intelligent Central...

    Yang-ming Ma, Zhi-tang Li, Jie Lei, Li Wang in Intelligence and Security Informatics (2007)