Towards Identifying True Threat from Network Security Data

Zhitang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma. Towards Identifying True Threat from Network Security Data. In Christopher C. Yang, Daniel Dajun Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen, editors, Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings. Volume 4430 of Lecture Notes in Computer Science, pages 160-171, Springer, 2007. [doi]

@inproceedings{LiLWLM07,
  title = {Towards Identifying True Threat from Network Security Data},
  author = {Zhitang Li and Jie Lei and Li Wang and Dong Li and Yang-ming Ma},
  year = {2007},
  doi = {10.1007/978-3-540-71549-8_14},
  url = {http://dx.doi.org/10.1007/978-3-540-71549-8_14},
  tags = {data-flow, security},
  researchr = {https://researchr.org/publication/LiLWLM07},
  cites = {0},
  citedby = {0},
  pages = {160-171},
  booktitle = {Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings},
  editor = {Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang and Qing Yang and Xueqi Cheng and Jue Wang and Fei-Yue Wang and Hsinchun Chen},
  volume = {4430},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-540-71548-1},
}