Modeling and detection of complex attacks, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, 2007. ,
DOI : 10.1109/SECCOM.2007.4550338
An ontology-based model for siem environments, ICGS3 '11 : 7th Int. Conf. in Global Security, Safety and Sustainability, pp.148-155, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00728521
Topological Vulnerability Analysis, 2007. ,
DOI : 10.1007/978-1-4419-0140-8_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.178.1935
A logic-based model to support alert correlation in intrusion detection, Information Fusion, vol.10, issue.4, pp.285-299, 2009. ,
DOI : 10.1016/j.inffus.2009.01.005
URL : https://hal.archives-ouvertes.fr/hal-00353059
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances, 20th Annual Computer Security Applications Conference, pp.350-359, 2004. ,
DOI : 10.1109/CSAC.2004.11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.8984
A New Alert Correlation Algorithm Based on Attack Graph, Computational Intelligence in Security for Information Systems, 2011. ,
DOI : 10.1007/978-3-642-21323-6_8
Attack Trees, Journal, vol.24, issue.12, pp.21-29, 1999. ,
DOI : 10.1002/9781119183631.ch21
Alert correlation through triggering events and common resources, ACSAC, 2004. ,