O. Dain and R. Cunningham, Building scenarios from a heterogeneous alert stream, Proceedings of the IEEE SMC Workshop on Information Assurance and Security, pp.231-235, 2001.
DOI : 10.1007/978-1-4615-0953-0_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.4897

H. Debar and A. Wespi, Aggregation and correlation of intrusiondetection alerts, Proceedings of the Fourth International Symposium on Recent Advances in Intrusion Detection, pp.85-103, 2001.
DOI : 10.1007/3-540-45474-8_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.6291

M. Fitting and M. Ben-jacob, Stratified and three-valued logic programming semantics, Proceedings of the Fifth International Conference and Symposium on Logic Programming, pp.1054-1069, 1988.

J. Keppens and J. Zeleznikow, A model based reasoning approach for generating plausible crime scenarios from evidence, Proceedings of the 9th international conference on Artificial intelligence and law , ICAIL '03, pp.51-59, 2003.
DOI : 10.1145/1047788.1047796

C. Liu, A. Singhal, and D. Wijesekera, Mapping evidence graphs to attack graphs, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.121-126, 2012.
DOI : 10.1109/WIFS.2012.6412636

C. Liu, A. Singhal, and D. Wijesekera, Using Attack Graphs in Forensic Examinations, 2012 Seventh International Conference on Availability, Reliability and Security, pp.596-603, 2012.
DOI : 10.1109/ARES.2012.58

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.7195

C. Liu, A. Singhal, and D. Wijesekera, Creating integrated evidence graphs for network forensics, in Advances in Digital Forensics, pp.227-241, 2013.
DOI : 10.1007/978-3-642-41148-9_16

C. Liu, A. Singhal, and D. Wijesekera, A model towards using evidence from security events for network attack analysis, Proceedings of the Eleventh International Workshop on Security in Information Systems, pp.83-95, 2014.

C. Liu, A. Singhal, and D. Wijesekera, Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction, Journal of Digital Forensics, Security and Law, vol.9, issue.2, pp.181-196, 2014.
DOI : 10.15394/jdfsl.2014.1180

URL : http://doi.org/10.15394/jdfsl.2014.1180

X. Ou, W. Boyer, and M. Mcqueen, A scalable approach to attack graph generation, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.336-345, 2006.
DOI : 10.1145/1180405.1180446

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.468.1616

X. Ou, S. Govindavajhala, and A. Appel, MulVAL: A logic-based network security analyzer, Proceedings of the Fourteenth USENIX Security Symposium, 2005.

P. Sommer, Intrusion detection systems as evidence, Computer Networks, vol.31, issue.23-24, pp.23-24, 1999.
DOI : 10.1016/S1389-1286(99)00113-9

T. Swift, D. Warren, K. Sagonas, J. Friere, P. Rao et al., The XSB System Version 3.6.x, p.2015

W. Wang and T. Daniels, A Graph Based Approach Toward Network Forensics Analysis, ACM Transactions on Information and System Security, vol.12, issue.1, 2008.
DOI : 10.1145/1410234.1410238