A possibilistic approach to intrusion detection under imperfect logging protocol. Younes, Ben, R., & Tremblay, G. In Elçi, A., Gaur, Singh, M., Orgun, M. A., & Makarevich, O. B., editors, SIN, pages 266-271, 2013. ACM.
Paper
Link bibtex @inproceedings{ conf/sin/YounesT13,
added-at = {2014-01-09T00:00:00.000+0100},
author = {Younes, Romdhane Ben and Tremblay, Guy},
biburl = {http://www.bibsonomy.org/bibtex/21efd75eac35d41157dc10e640a510ba2/dblp},
booktitle = {SIN},
crossref = {conf/sin/2013},
editor = {Elçi, Atilla and Gaur, Manoj Singh and Orgun, Mehmet A. and Makarevich, Oleg B.},
ee = {http://doi.acm.org/10.1145/2523514.2523546},
interhash = {b81e551b4d9356b0844c0626faf76272},
intrahash = {1efd75eac35d41157dc10e640a510ba2},
isbn = {978-1-4503-2498-4},
keywords = {dblp},
pages = {266-271},
publisher = {ACM},
title = {A possibilistic approach to intrusion detection under imperfect logging protocol.},
url = {http://dblp.uni-trier.de/db/conf/sin/sin2013.html#YounesT13},
year = {2013}
}
Downloads: 0
{"_id":{"_str":"535fa530bea4535b21000534"},"__v":0,"authorIDs":[],"author_short":["Younes","Ben, R.","Tremblay, G."],"bibbaseid":"younes-ben-tremblay-apossibilisticapproachtointrusiondetectionunderimperfectloggingprotocol-2013","bibdata":{"downloads":0,"keyword":["dblp"],"bibbaseid":"younes-ben-tremblay-apossibilisticapproachtointrusiondetectionunderimperfectloggingprotocol-2013","urls":{"Paper":"http://dblp.uni-trier.de/db/conf/sin/sin2013.html#YounesT13","Link":"http://doi.acm.org/10.1145/2523514.2523546"},"role":"author","year":"2013","url":"http://dblp.uni-trier.de/db/conf/sin/sin2013.html#YounesT13","type":"inproceedings","title":"A possibilistic approach to intrusion detection under imperfect logging protocol.","publisher":"ACM","pages":"266-271","keywords":"dblp","key":"conf/sin/YounesT13","isbn":"978-1-4503-2498-4","intrahash":"1efd75eac35d41157dc10e640a510ba2","interhash":"b81e551b4d9356b0844c0626faf76272","id":"conf/sin/YounesT13","ee":"http://doi.acm.org/10.1145/2523514.2523546","editor_short":["Elçi, A.","Gaur","Singh, M.","Orgun, M.<nbsp>A.","Makarevich, O.<nbsp>B."],"editor":["Elçi, Atilla","Gaur","Singh, Manoj","Orgun, Mehmet A.","Makarevich, Oleg B."],"crossref":"conf/sin/2013","booktitle":"SIN","biburl":"http://www.bibsonomy.org/bibtex/21efd75eac35d41157dc10e640a510ba2/dblp","bibtype":"inproceedings","bibtex":"@inproceedings{ conf/sin/YounesT13,\n added-at = {2014-01-09T00:00:00.000+0100},\n author = {Younes, Romdhane Ben and Tremblay, Guy},\n biburl = {http://www.bibsonomy.org/bibtex/21efd75eac35d41157dc10e640a510ba2/dblp},\n booktitle = {SIN},\n crossref = {conf/sin/2013},\n editor = {Elçi, Atilla and Gaur, Manoj Singh and Orgun, Mehmet A. and Makarevich, Oleg B.},\n ee = {http://doi.acm.org/10.1145/2523514.2523546},\n interhash = {b81e551b4d9356b0844c0626faf76272},\n intrahash = {1efd75eac35d41157dc10e640a510ba2},\n isbn = {978-1-4503-2498-4},\n keywords = {dblp},\n pages = {266-271},\n publisher = {ACM},\n title = {A possibilistic approach to intrusion detection under imperfect logging protocol.},\n url = {http://dblp.uni-trier.de/db/conf/sin/sin2013.html#YounesT13},\n year = {2013}\n}","author_short":["Younes","Ben, R.","Tremblay, G."],"author":["Younes","Ben, Romdhane","Tremblay, Guy"],"added-at":"2014-01-09T00:00:00.000+0100"},"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/guy tremblay?items=1000","downloads":0,"keywords":["dblp"],"search_terms":["possibilistic","approach","intrusion","detection","under","imperfect","logging","protocol","younes","ben","tremblay"],"title":"A possibilistic approach to intrusion detection under imperfect logging protocol.","year":2013,"dataSources":["GdQLgoLkBnEy5fofR"]}