Amanote Research

Amanote Research

    RegisterSign In

Mining Known Attack Patterns From Security-Related Events

PeerJ Computer Science - United States
doi 10.7717/peerj-cs.25
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer Science
Date

October 7, 2015

Authors
Nicandro ScarabeoBenjamin C.M. FungRashid H. Khokhar
Publisher

PeerJ


Related search

Mining Co-Location Patterns With Rare Events From Spatial Data Sets

GeoInformatica
DevelopmentPlanningInformation SystemsGeography
2006English

Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications

2016English

Mining Sequential Patterns for Interval Based Events by Applying Multiple Constraints

International Journal on Computational Science & Applications
2014English

Efficiently Mining Long Patterns From Databases

SIGMOD Record
Information SystemsSoftware
1998English

Mining Topological Relationship Patterns From Spatiotemporal Databases

International Journal of Data Mining & Knowledge Management Process
2012English

Mining Frequent Trajectory Patterns From GPS Tracks

2010English

Mining Frequent Subgraph Patterns From Uncertain Graphs

Ruan Jian Xue Bao/Journal of Software
Software
2009English

Understanding Attack Trends From Security Blog Posts Using Guided-Topic Model

Journal of Information Processing
2019English

Revisiting Cloud Security Threats: Repudiation Attack

International Journal of Recent Technology and Engineering
EngineeringManagement of TechnologyInnovation
2020English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy