-
4
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
Apr.
-
T. Bass. Intrusion detection systems and multisensor data fusion. Communications of the ACM, 43(4):99-105, Apr. 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
8
-
-
84862361232
-
-
CISCO. Netflow. http://www.cisco.com/go/netflow.
-
Netflow
-
-
-
11
-
-
84862365987
-
-
CISCO. Using CAR during DoS attacks. http://www.cisco.com/warp/public/63/ car_rate_ limit_icmp.html.
-
Using CAR during DoS Attacks
-
-
-
12
-
-
0004225165
-
Intrusion detection message exchange format data model and extensible markup language (XML) document type definition
-
Nov. Work-in-progress
-
D. A. Curry and H. Debar. Intrusion detection message exchange format data model and extensible markup language (XML) document type definition. Internet Draft, Nov. 2002. Work-in-progress.
-
(2002)
Internet Draft
-
-
Curry, D.A.1
Debar, H.2
-
13
-
-
77952411826
-
Passively monitoring networks at gigabit speeds using commodity hardware and open source software
-
NLANR/MNA, April
-
L. Deri. Passively monitoring networks at gigabit speeds using commodity hardware and open source software. In Passive and Active Measurement Workshop 2003. NLANR/MNA, April 2003.
-
(2003)
Passive and Active Measurement Workshop 2003
-
-
Deri, L.1
-
15
-
-
0012163370
-
The intrusion detection exchange protocol (IDXP)
-
Oct. Work-in-progress
-
B. S. Feinstein, G. A. Matthews, and J. C. C. White. The intrusion detection exchange protocol (IDXP). Internet Draft, Oct. 2002. Work-in-progress.
-
(2002)
Internet Draft
-
-
Feinstein, B.S.1
Matthews, G.A.2
White, J.C.C.3
-
20
-
-
85180745018
-
Implementing pushback: Router-based defense against DDoS attacks
-
San Diego, California, February. The Internet Society
-
J. Ioannidis and S. M. Bellovin. Implementing pushback: Router-based defense against DDoS attacks. In Proceedings of NDSS Symposium, San Diego, California, February 2002. The Internet Society.
-
(2002)
Proceedings of NDSS Symposium
-
-
Ioannidis, J.1
Bellovin, S.M.2
-
22
-
-
0012882330
-
Theory of evidence - A survey of its mathematical foundations, applications and computational analysis
-
J. Kohlas and P. Monney. Theory of evidence - a survey of its mathematical foundations, applications and computational analysis. ZOR- Mathematical Methods of Operations Research, 39:35-68, 1994.
-
(1994)
ZOR-mathematical Methods of Operations Research
, vol.39
, pp. 35-68
-
-
Kohlas, J.1
Monney, P.2
-
23
-
-
1642283261
-
A taxonomy of DDoS attacks and DDoS defense mechanisms
-
Computer Science Dept., University of California, Los Angeles
-
J. Mirkovic, J. Martin, and P. Reiher. A taxonomy of DDoS attacks and DDoS defense mechanisms. Technical report 020018.Computer Science Dept., University of California, Los Angeles.
-
Technical Report 020018
-
-
Mirkovic, J.1
Martin, J.2
Reiher, P.3
-
24
-
-
84904888755
-
Attacking DDoS at the source
-
Paris, France, November
-
J. Mirkovic, G. Prier, and P. Reiher. Attacking DDoS at the source. In Proceedings of ICNP 2002, pages 312-321, Paris, France, November 2002.
-
(2002)
Proceedings of ICNP 2002
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
30
-
-
0344289821
-
Fuzzy information approaches to equipment condition monitoring and diagnosis
-
IEEE Press
-
K. Tomsovic and B. Baer. Fuzzy information approaches to equipment condition monitoring and diagnosis. Electric Power Applications of Fuzzy Systems, IEEE Press, pages 59-84, 1998.
-
(1998)
Electric Power Applications of Fuzzy Systems
, pp. 59-84
-
-
Tomsovic, K.1
Baer, B.2
-
31
-
-
0036051055
-
Sensor fusion using Dempster-Shafer theory
-
Anchorage, AK, USA
-
H. Wu, M. Siegel, R. Stiefelhagen, and J. Yang. Sensor fusion using Dempster-Shafer theory. In Proceedings of IEEE Instrumentation and Measurement Technology Conference, Anchorage, AK, USA, 2002.
-
(2002)
Proceedings of IEEE Instrumentation and Measurement Technology Conference
-
-
Wu, H.1
Siegel, M.2
Stiefelhagen, R.3
Yang, J.4
|