Keyphrases
Security Analysis
100%
Graph Matching
100%
Security Incidents
100%
Correlation Technique
100%
Similarity-based Approach
100%
Statistical Methods
50%
Computational Analysis
25%
Event Detection
25%
Performance Guarantee
25%
Cybersecurity
25%
Network Research
25%
Information Extraction
25%
Development Communities
25%
Network Development
25%
Similarity Measure
25%
Rule-based
25%
Pattern Matching
25%
Correlation Network
25%
Situation Information
25%
Traditional Rule
25%
Event Identification
25%
Event Attributes
25%
Technical Component
25%
Computer Science
Event Analysis
100%
Proposed Mechanism
100%
Similarity Graph
100%
Research Community
50%
Performance Guarantee
50%
Development Community
50%
Experimental Result
50%
Network Research
50%
Event Detection
50%
Pattern Matching
50%
Extract Information
50%
Similarity Measurement
50%
Situation Awareness
50%
Event Identification
50%
Technical Component
50%
Engineering
Similarities
100%
Tasks
33%
Simulation Result
33%
Experimental Result
33%
Computational Analysis
33%
Event Detection
33%
Pattern Matching
33%
Situation Awareness
33%
Graphical Form
33%