Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009 2009
DOI: 10.1117/12.820000
|View full text |Cite
|
Sign up to set email alerts
|

Feature-based alert correlation in security systems using self organizing maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Kumar et al [20] use the SOM for clustering the alerts while selecting extracted features from alerts as inputs. After the features are identified the SOM is trained.…”
Section: B Artificial Neural Network Clustering Algorithmmentioning
confidence: 99%
“…Kumar et al [20] use the SOM for clustering the alerts while selecting extracted features from alerts as inputs. After the features are identified the SOM is trained.…”
Section: B Artificial Neural Network Clustering Algorithmmentioning
confidence: 99%
“…However, steganography and cryptography differ in the way they are evaluated: steganography fails when the "enemy" is able to access the content of the cipher message, while cryptography fails when the "enemy" detects that there is a secret message present in the steganographic medium [6].…”
Section: Cryptography Versus Steganographymentioning
confidence: 99%