Mcareavey, Kevin; Liu, Weiru; Miller, Paul; Mu, Kedian Measuring inconsistency in a network intrusion detection rule set based on Snort. (English) Zbl 1234.68376 Int. J. Semant. Comput. 5, No. 3 (2011). Cited in 9 Documents MSC: 68T37 Reasoning under uncertainty in the context of artificial intelligence 68T27 Logic in artificial intelligence 68T35 Theory of languages and software systems (knowledge-based systems, expert systems, etc.) for artificial intelligence Keywords:network intrusion detection; inconsistency measures; Snort rules Software:FIREMAN PDF BibTeX XML Full Text: DOI OpenURL References:  Kim B., International Journal of Computers 3 pp 45–  Beg S., International Journal for Advances in Computer Science 1 pp 26–  A. Hunter and S. Konieczny, Inconsistency Tolerance, LNCS 3300 (Springer, 2004) pp. 189–234.  DOI: 10.1007/s10115-003-0125-6 · Zbl 02224685  Mu K., Journal of Logic and Computation  DOI: 10.1109/65.283931  DOI: 10.1007/s10207-007-0045-7 · Zbl 05342751  DOI: 10.1109/JSAC.2005.854119  Ligȩza A., Logical Foundations for Rule-Based Systems (2006)  DOI: 10.1111/j.1467-8640.1996.tb00275.x · Zbl 01939396  DOI: 10.1007/s10115-006-0021-y  DOI: 10.1016/j.ejor.2007.06.066 · Zbl 1176.90410  DOI: 10.1016/j.artint.2010.06.001 · Zbl 1210.68106 This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.