G-CAS: Greedy Algorithm-Based Security Event Correlation System for Critical Infrastructure Network

The attacks on the critical infrastructure network have increased sharply, and the strict management measures of the critical infrastructure network have caused its correlation analysis technology for security events to be relatively backward; this makes the critical infrastructure network’s securit...

Full description

Bibliographic Details
Main Authors: Peng Lu, Teng Hu, Hao Wang, Ruobin Zhang, Guo Wu
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2021/3566360