Cited By
View all- Nehinbe J(2021)A cost-effective strategy for splitting and allocating alerts' workloads during forensic investigations of very large IDS logsInternational Journal of Internet Technology and Secured Transactions10.1504/ijitst.2021.11352011:2(160-175)Online publication date: 1-Jan-2021
- Mishra PPilli EVaradharajan VTupakula U(2017)Intrusion detection techniques in cloud environmentJournal of Network and Computer Applications10.1016/j.jnca.2016.10.01577:C(18-47)Online publication date: 1-Jan-2017
- Johnston RKim SCoe DEtzkorn LKulick JMilenkovic ATrien JProwell SGoodall JBridges R(2016)Xen Network Flow Analysis for Intrusion DetectionProceedings of the 11th Annual Cyber and Information Security Research Conference10.1145/2897795.2897802(1-4)Online publication date: 5-Apr-2016
- Show More Cited By