Using rule association to generate data collection policies
Collecting security-related data of devices effectively is the foundation of analyzing network threats accurately.Existing data collection methods (full data collection, sampling based data collection and adaptive data collection) do not consider the validity of the collected data and their correlat...
Saved in:
Main Authors: | Pei CHEN, Fenghua LI, Zifu LI, Yunchuan GUO, Lin CHENG |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2021-10-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021085 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Collection policy refining method for threat monitoring in complex network environment
by: Fenghua LI, et al.
Published: (2019-04-01) -
Mining the applications to study at Lithuania's institutions of higher education using association rules
by: Ieva Mitašiūnaitė, et al.
Published: (2004-12-01) -
Database anomaly detection model based on mining object-condition association rules
by: DAI Hua, et al.
Published: (2009-01-01) -
Association rules recommendation algorithm supporting recommendation nonempty
by: Ming HE, et al.
Published: (2017-10-01) -
Optimal and Economic Programming in a Reconfigured Competitive Electricity Market Considering Dispersed Generation Sources with the Firefly Algorithm
by: Muhammad Sibtain, et al.
Published: (2022-07-01)