Zhitang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma. Towards Identifying True Threat from Network Security Data. In Christopher C. Yang, Daniel Dajun Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen, editors, Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings. Volume 4430 of Lecture Notes in Computer Science, pages 160-171, Springer, 2007. [doi]
@inproceedings{LiLWLM07, title = {Towards Identifying True Threat from Network Security Data}, author = {Zhitang Li and Jie Lei and Li Wang and Dong Li and Yang-ming Ma}, year = {2007}, doi = {10.1007/978-3-540-71549-8_14}, url = {http://dx.doi.org/10.1007/978-3-540-71549-8_14}, tags = {data-flow, security}, researchr = {https://researchr.org/publication/LiLWLM07}, cites = {0}, citedby = {0}, pages = {160-171}, booktitle = {Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings}, editor = {Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang and Qing Yang and Xueqi Cheng and Jue Wang and Fei-Yue Wang and Hsinchun Chen}, volume = {4430}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-71548-1}, }