-
1
-
-
48049099857
-
Intrusion detection systems: Perspective
-
Technical report, Gartner Inc
-
A. Allen. Intrusion detection systems: Perspective. Technical report, Gartner Inc., 2003.
-
(2003)
-
-
Allen, A.1
-
2
-
-
84964194161
-
-
A. Andrzejak and Z. Xu. Scalable, efficient range queries for grid information services. p2p, 00:33-40, 2002.
-
A. Andrzejak and Z. Xu. Scalable, efficient range queries for grid information services. p2p, 00:33-40, 2002.
-
-
-
-
3
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Technical Report 99-15, Chalmers University of Technology, Department of Computer Engineering
-
S. Axelsson. Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Chalmers University of Technology, Department of Computer Engineering, 2000.
-
(2000)
-
-
Axelsson, S.1
-
4
-
-
84955580290
-
An architecture for intrusion detection using autonomous agents
-
Scottsdale
-
J. S. Balasubramaniyan, J. O. Garcia-Femandez, D. I. E. Spafford, and D. Zamboni. An architecture for intrusion detection using autonomous agents. In 14th Annual Computer Security Applications Conference, Scottsdale, pages 13-24, 1998.
-
(1998)
14th Annual Computer Security Applications Conference
, pp. 13-24
-
-
Balasubramaniyan, J.S.1
Garcia-Femandez, J.O.2
Spafford, D.I.E.3
Zamboni, D.4
-
5
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
New York
-
I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: a distributed anonymous information storage and retrieval system. In International Workshop on Designing Privacy Enhancing Technologies, New York, pages 46-66, 2001.
-
(2001)
International Workshop on Designing Privacy Enhancing Technologies
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
7
-
-
48049096765
-
-
H. Debar, D. Curry, and B. Feinstein. The intrusion detection message exchange format. http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml- 14.txt (last visited: 2006/08), June 2005. Internet-Draft, http://www.ietf.org/ internet-drafts/draft-ietf-idwg-idmef-xml-14.txt.
-
H. Debar, D. Curry, and B. Feinstein. The intrusion detection message exchange format. http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml- 14.txt (last visited: 2006/08), June 2005. Internet-Draft, http://www.ietf.org/ internet-drafts/draft-ietf-idwg-idmef-xml-14.txt.
-
-
-
-
10
-
-
10944257572
-
Feature selection for intrusion detection: An evolutionary approach
-
Budapest
-
A. Hofmann, T. Horeis, and B. Sick. Feature selection for intrusion detection: An evolutionary approach. In IJCNN 2004: Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, Budapest, volume 2, pages 1563-1568, 2004.
-
(2004)
IJCNN 2004: Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks
, vol.2
, pp. 1563-1568
-
-
Hofmann, A.1
Horeis, T.2
Sick, B.3
-
13
-
-
0011066222
-
Applying mobile agents to intrusion detection and response
-
Technical Report 6416, National Institute of Standards and Technology, Computer Security Division
-
W. Jansen, P. Meli, T. Karygiannis, and D. Marks. Applying mobile agents to intrusion detection and response. Technical Report 6416, National Institute of Standards and Technology, Computer Security Division, 1999.
-
(1999)
-
-
Jansen, W.1
Meli, P.2
Karygiannis, T.3
Marks, D.4
-
15
-
-
28544452631
-
A survey of interestingness measures for knowledge discovery
-
K. McGarry. A survey of interestingness measures for knowledge discovery. Knowledge Engineering Review, 20(1):39-61, 2005.
-
(2005)
Knowledge Engineering Review
, vol.20
, Issue.1
, pp. 39-61
-
-
McGarry, K.1
-
16
-
-
8344222337
-
Load balancing in structured p2p systems
-
Berkeley
-
A. Rao, K. Lakshminarayanan, S. Surana, R. Karp, and I. Stoica. Load balancing in structured p2p systems. In Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS03), Berkeley, 2003.
-
(2003)
Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS03)
-
-
Rao, A.1
Lakshminarayanan, K.2
Surana, S.3
Karp, R.4
Stoica, I.5
-
21
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
San Diego
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, San Diego, pages 149-160, 2001.
-
(2001)
SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
22
-
-
48049112339
-
A survey of distributed intrusion detection approaches
-
Technical Report CR/0501001, National Center for Supercomputing Applications NCSA
-
M. Treaster. A survey of distributed intrusion detection approaches. Technical Report CR/0501001, National Center for Supercomputing Applications (NCSA), 2005.
-
(2005)
-
-
Treaster, M.1
-
24
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
F. Valeur, G. Vigna, C. Kruegel, and R. A. Kemmerer. A comprehensive approach to intrusion detection alert correlation. IEEE Transactions on Dependable and Secure Computing, 1(3):146-169, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
-
25
-
-
0029756282
-
Cooperating security managers: A peer based intrusion detection system
-
G. B. White, E. A. Fisch, and U. W. Pooch. Cooperating security managers: A peer based intrusion detection system. IEEE Network, 10(1):20-23, 1996.
-
(1996)
IEEE Network
, vol.10
, Issue.1
, pp. 20-23
-
-
White, G.B.1
Fisch, E.A.2
Pooch, U.W.3
|