Using rule association to generate data collection policies

Collecting security-related data of devices effectively is the foundation of analyzing network threats accurately.Existing data collection methods (full data collection, sampling based data collection and adaptive data collection) do not consider the validity of the collected data and their correlat...

Full description

Saved in:
Bibliographic Details
Main Authors: Pei CHEN, Fenghua LI, Zifu LI, Yunchuan GUO, Lin CHENG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2021-10-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021085
Tags: Add Tag
No Tags, Be the first to tag this record!