Reasoning About Complementary Intrusion Evidence

Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves. Reasoning About Complementary Intrusion Evidence. In 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA. pages 39-48, IEEE Computer Society, 2004. [doi]

@inproceedings{ZhaiNIR04,
  title = {Reasoning About Complementary Intrusion Evidence},
  author = {Yan Zhai and Peng Ning and Purush Iyer and Douglas S. Reeves},
  year = {2004},
  doi = {10.1109/CSAC.2004.29},
  url = {http://doi.ieeecomputersociety.org/10.1109/CSAC.2004.29},
  researchr = {https://researchr.org/publication/ZhaiNIR04},
  cites = {0},
  citedby = {0},
  pages = {39-48},
  booktitle = {20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA},
  publisher = {IEEE Computer Society},
  isbn = {0-7695-2252-1},
}