-
1
-
-
42449117164
-
Guide to intrusion detection and prevention systems (idps)
-
Technical Report 800-94. NIST, US Dept. of Commerce
-
Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (idps). Technical Report 800-94. NIST, US Dept. of Commerce (2007)
-
(2007)
-
-
Scarfone, K.1
Mell, P.2
-
2
-
-
0023294428
-
An intrusion-detection model
-
Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 222-232 (1987)
-
(1987)
IEEE Trans. Softw. Eng
, vol.13
, pp. 222-232
-
-
Denning, D.E.1
-
3
-
-
56449096542
-
-
Cisco Systems: Cisco IOS NetFlow (2007). http://www.cisco.com/go/netflow
-
(2007)
Cisco IOS NetFlow
-
-
-
4
-
-
37249064377
-
FlowMon Probe
-
Technical Report 31/2006, CESNET, z. s. p. o
-
Čeleda, P., Kováčik, M., Koníř, T., Krmíček, V., Špringl, P., Žádník, M.: FlowMon Probe. Technical Report 31/2006, CESNET, z. s. p. o (2006), http://www.cesnet.cz/doc/techzpravy/2006/flowmon-probe/
-
(2006)
-
-
Čeleda, P.1
Kováčik, M.2
Koníř, T.3
Krmíček, V.4
Špringl, P.5
Žádník, M.6
-
5
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
Lazarevic, A., Ertöz, L., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the Third SIAM International Conference on Data Mining (2003)
-
(2003)
Proceedings of the Third SIAM International Conference on Data Mining
-
-
Lazarevic, A.1
Ertöz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
6
-
-
33746891961
-
-
McGraw-Hill, New York
-
Bragg, R., Rhodes-Ousley, M., Strassberg, K.: Network Security; The Complete Reference. McGraw-Hill, New York (2004)
-
(2004)
Network Security; The Complete Reference
-
-
Bragg, R.1
Rhodes-Ousley, M.2
Strassberg, K.3
-
7
-
-
85006210403
-
Review on computational trust and reputation models
-
Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artif. Intell. Rev. 24, 33-60 (2005)
-
(2005)
Artif. Intell. Rev
, vol.24
, pp. 33-60
-
-
Sabater, J.1
Sierra, C.2
-
8
-
-
0036367544
-
Reputation and social network analysis in multi-agent systems
-
Bologna, Italy, pp
-
Sabater, J., Sierra, C.: Reputation and social network analysis in multi-agent systems. In: Proceedings of AAMAS 2002, Bologna, Italy, pp. 475-482 (2002)
-
(2002)
Proceedings of AAMAS
, pp. 475-482
-
-
Sabater, J.1
Sierra, C.2
-
9
-
-
9244265500
-
Devising a trust model for multi-agent interactions using confidence and reputation
-
Ramchurn. S., Jennings, N., Sierra, C. Godo, L.: Devising a trust model for multi-agent interactions using confidence and reputation. Applied Artificial Intelligence 18, 833-852 (2004)
-
(2004)
Applied Artificial Intelligence
, vol.18
, pp. 833-852
-
-
Ramchurn, S.1
Jennings, N.2
Sierra, C.3
Godo, L.4
-
10
-
-
85041439566
-
Principles of trust for mas: Cognitive anatomy, social importance, and quantification
-
IEEE Computer Society Press, Los Alamitos
-
Castelfranchi, C., Falcone, R.: Principles of trust for mas: Cognitive anatomy, social importance, and quantification. In: Proceedings of the 3rd International Conference on Multi Agent Systems, p. 72. IEEE Computer Society Press, Los Alamitos (1998)
-
(1998)
Proceedings of the 3rd International Conference on Multi Agent Systems
, pp. 72
-
-
Castelfranchi, C.1
Falcone, R.2
-
11
-
-
33744773886
-
Simplification and analysis of transitive trust networks
-
Josang, A., Gray, E., Kinateder, M.: Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems 4, 139-162 (2006)
-
(2006)
Web Intelligence and Agent Systems
, vol.4
, pp. 139-162
-
-
Josang, A.1
Gray, E.2
Kinateder, M.3
-
12
-
-
33846966283
-
An integrated trust and reputation model for open multi-agent systems
-
Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. Journal of Autonomous Agents and Multi-Agent Systems 13. 119-154 (2006)
-
(2006)
Journal of Autonomous Agents and Multi-Agent Systems
, vol.13
, pp. 119-154
-
-
Huynh, T.D.1
Jennings, N.R.2
Shadbolt, N.R.3
-
13
-
-
37249032765
-
-
Rehak, M., Pechoucek, M.: Trust modeling with context representation and generalized identities. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling. L. (eds.) CIA 2007. LNCS (LNAI), 4676. Springer, Heidelberg (2007)
-
Rehak, M., Pechoucek, M.: Trust modeling with context representation and generalized identities. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling. L. (eds.) CIA 2007. LNCS (LNAI), vol. 4676. Springer, Heidelberg (2007)
-
-
-
-
14
-
-
37249002882
-
-
Rettinger, A., Nickles, M., Tresp, V.: Learning initial trust among interacting agents. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling, L. (eds.) CIA 2007. LNCS (LNAI), 4670, pp. 313-327. Springer, Heidelberg (2007)
-
Rettinger, A., Nickles, M., Tresp, V.: Learning initial trust among interacting agents. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling, L. (eds.) CIA 2007. LNCS (LNAI), vol. 4670, pp. 313-327. Springer, Heidelberg (2007)
-
-
-
-
15
-
-
33745441630
-
MINDS - Minnesota Intrusion Detection System
-
MIT Press, Cambridge
-
Ertoz, L., Eilertson. E., Lazarevic, A., Tan, P.N., Kumar, V., Srivastava, J., Dokas, P.: MINDS - Minnesota Intrusion Detection System. In: Next Generation Data Mining. MIT Press, Cambridge (2004)
-
(2004)
Next Generation Data Mining
-
-
Ertoz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.N.4
Kumar, V.5
Srivastava, J.6
Dokas, P.7
-
17
-
-
21844451952
-
Diagnosis Network-Wide Traffic Anomalies
-
ACM Press, New York
-
Lakhina, A., Crovella, M., Diot, C.: Diagnosis Network-Wide Traffic Anomalies. In: ACM STGCOMM 2004, pp. 219-230. ACM Press, New York (2004)
-
(2004)
ACM STGCOMM
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
18
-
-
33847290520
-
-
Lakhina, A., Crovella, M., Diot, C.: Mining Anomalies using Traffic Feature Distributions. In: ACM SIGCOMM, August 2005, pp. 217-228. ACM Press, New York (2005)
-
Lakhina, A., Crovella, M., Diot, C.: Mining Anomalies using Traffic Feature Distributions. In: ACM SIGCOMM, August 2005, pp. 217-228. ACM Press, New York (2005)
-
-
-
-
19
-
-
44149113560
-
Network intrusion detection by means of community of trusting agents
-
IEEE Computer Society Press. Los Alamitos
-
Rehak, M., Pechoucek, M., Bartos, K., Grill, M., Celeda, P.: Network intrusion detection by means of community of trusting agents. In: IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2007 Main Conference Proceedings) (IAT 2007). IEEE Computer Society Press. Los Alamitos (2007)
-
(2007)
IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2007 Main Conference Proceedings) (IAT
-
-
Rehak, M.1
Pechoucek, M.2
Bartos, K.3
Grill, M.4
Celeda, P.5
-
20
-
-
33846266235
-
Trust Model for Open Ubiquitous Agent Systems. In: Intelligent Agent Technology
-
IEEE
-
Rehák, M., Foltýn. L., Pěchoucček, M., Benda, P.: Trust Model for Open Ubiquitous Agent Systems. In: Intelligent Agent Technology. 2005 IEEE/WIC/ACM International Conference (2005); Number PR2416 in IEEE
-
(2005)
IEEE/WIC/ACM International Conference (2005); Number PR2416
-
-
Rehák, M.1
Foltýn, L.2
Pěchoucček, M.3
Benda, P.4
-
21
-
-
0003922190
-
-
2nd edn. John Wiley & Sons, New York
-
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. John Wiley & Sons, New York (2001)
-
(2001)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
22
-
-
84961646665
-
-
Lyon. G.: Nmap, http://insecure.org/nmap/
-
Nmap
-
-
Lyon, G.1
-
23
-
-
1142293052
-
Detecting deception in reputation management
-
ACM Press, New York
-
Yu, B., Singh. M.P.: Detecting deception in reputation management. In: AAMAS 2003. pp. 73-80. ACM Press, New York (2003)
-
(2003)
AAMAS
, pp. 73-80
-
-
Yu, B.1
Singh, M.P.2
-
24
-
-
78650361584
-
-
Barber, K.S., Kim, J.: Belief revision process based on trust: Agents evaluating reputation of information sources. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), 2246, pp. 73-82. Springer, Heidelberg (2001)
-
Barber, K.S., Kim, J.: Belief revision process based on trust: Agents evaluating reputation of information sources. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), vol. 2246, pp. 73-82. Springer, Heidelberg (2001)
-
-
-
-
25
-
-
37249034250
-
-
Vu, L.-H., Aberer, K.: A probabilistic framework for decentralized management of trust and quality. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling, L. (eds.) CIA 2007. LNCS (LNAI). 4676. pp. 328-342. Springer, Heidelberg (2007)
-
Vu, L.-H., Aberer, K.: A probabilistic framework for decentralized management of trust and quality. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling, L. (eds.) CIA 2007. LNCS (LNAI). vol. 4676. pp. 328-342. Springer, Heidelberg (2007)
-
-
-
-
26
-
-
0032021555
-
On combining classifiers
-
Kittler, J., Hatef, M., Duin, R.P.W., Matas, J.: On combining classifiers. IEEE Trans. Pattern Anal. Mach. Intell. 20, 226-239 (1998)
-
(1998)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.20
, pp. 226-239
-
-
Kittler, J.1
Hatef, M.2
Duin, R.P.W.3
Matas, J.4
-
27
-
-
34247200536
-
Mlbp: Mas for large-scale biometric pattern recognition
-
ACM Press, New York
-
Meshulam, R., Reches, S., Yarden, A., Kraus, S.: Mlbp: Mas for large-scale biometric pattern recognition. In: AAMAS 2006: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, pp. 1095-1097. ACM Press, New York (2006)
-
(2006)
AAMAS 2006: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
, pp. 1095-1097
-
-
Meshulam, R.1
Reches, S.2
Yarden, A.3
Kraus, S.4
-
28
-
-
21944457574
-
-
Valeur, F., Vigna, G., Kruegel, C., Kemmerer, R.A.: A comprehensive approach to intrusion detection alert correlation. IEEE Transactions on Dependable and Secure Computing 01. 146-169 (2004)
-
Valeur, F., Vigna, G., Kruegel, C., Kemmerer, R.A.: A comprehensive approach to intrusion detection alert correlation. IEEE Transactions on Dependable and Secure Computing 01. 146-169 (2004)
-
-
-
-
29
-
-
35148882671
-
Network intrusion detection through adaptive sub-eigenspace modeling in multiagent systems
-
Shyu, M.L., Quirino, T. Xie. Z., Chen, S.C., Chang, L.: Network intrusion detection through adaptive sub-eigenspace modeling in multiagent systems. ACM Trans. Auton. Adapt. Syst. 2, 9 (2007)
-
(2007)
ACM Trans. Auton. Adapt. Syst
, vol.2
, pp. 9
-
-
Shyu, M.L.1
Quirino, T.2
Xie, Z.3
Chen, S.C.4
Chang, L.5
-
31
-
-
57849142980
-
-
Rehak, M., Pechoucek. M., Celeda. P., Krmicek, V., Moninec, J. Dymacek, T., Medvigy, D.: High-performance agent system for intrusion detection in backbone networks. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling. L. (eds.) CIA 2007. LNCS (LNAI), 4670. Springer, Heidelberg (2007)
-
Rehak, M., Pechoucek. M., Celeda. P., Krmicek, V., Moninec, J. Dymacek, T., Medvigy, D.: High-performance agent system for intrusion detection in backbone networks. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling. L. (eds.) CIA 2007. LNCS (LNAI), vol. 4670. Springer, Heidelberg (2007)
-
-
-
|