-
1
-
-
74049152664
-
-
F-Secure Corporation
-
F-Secure Linux Security: http://www.f-secure.com/linux-weblog/. F-Secure Corporation (2006-2009)
-
(2006)
F-Secure Linux Security
-
-
-
2
-
-
74049150105
-
-
Samhain IDS: http://www.la-samhna.de/samhain/ (2001-2009)
-
(2001)
-
-
Samhain, I.D.S.1
-
3
-
-
74049157208
-
-
Snort IDS: http://www.snort.org/ (1998-2009)
-
(1998)
-
-
-
4
-
-
33846198398
-
Protecting host-based intrusion detectors through virtual machines
-
Laureano, M., Maziero, C., Jamhour, E.: Protecting host-based intrusion detectors through virtual machines. Computer Networks 51(5), (2007) pp. 1275-1283
-
(2007)
Computer Networks
, vol.51
, Issue.5
, pp. 1275-1283
-
-
Laureano, M.1
Maziero, C.2
Jamhour, E.3
-
5
-
-
70350693176
-
-
Prelude IDS
-
Prelude IDS: http://www.prelude-ids.com/. PreludeIDS Technologies (2005-2009)
-
(2005)
PreludeIDS Technologies
-
-
-
6
-
-
0004225165
-
The Intrusion Detection Message Exchange Format, Internet Draft
-
Technical Report, IETF Intrusion Detection Exchange Format Working Group July
-
Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format, Internet Draft. Technical Report, IETF Intrusion Detection Exchange Format Working Group (July 2004)
-
(2004)
-
-
Debar, H.1
Curry, D.2
Feinstein, B.3
-
7
-
-
34248347086
-
Investigating new approaches to data collection, management and analysis for network intrusion detection
-
New York, USA
-
Derrick, E.J., Tibbs, R.W., Reynolds, L.L.: Investigating new approaches to data collection, management and analysis for network intrusion detection. In: Proceedings of the 45th Annual Southeast Regional Conference, (SE'07), New York, USA (2007) pp. 283-287
-
(2007)
Proceedings of the 45th Annual Southeast Regional Conference, (SE'07)
, pp. 283-287
-
-
Derrick, E.J.1
Tibbs, R.W.2
Reynolds, L.L.3
-
8
-
-
34748814488
-
Evaluation of a decentralized architecture for large scale collaborative intrusion detection
-
Munich, Germany
-
Zhou, C.V., Karunasekera, S., Leckie, C.: Evaluation of a decentralized architecture for large scale collaborative intrusion detection. In: Proceedings of the 10th IFIP/IEEE International Symposium on Integrated Network Management, IM 2007, Munich, Germany, (2007) pp. 80-89
-
(2007)
Proceedings of the 10th IFIP/IEEE International Symposium on Integrated Network Management, IM
, pp. 80-89
-
-
Zhou, C.V.1
Karunasekera, S.2
Leckie, C.3
-
9
-
-
34250737826
-
Management and integration of information in intrusion detection system: Data integration system for ids based multi-agent systems
-
Washington, DC, USA
-
Claudino, E.C., Abdelouahab, Z., Teixeira, M.M.: Management and integration of information in intrusion detection system: Data integration system for ids based multi-agent systems. In: Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, WI-IATW 2006, Washington, DC, USA (2006) pp. 49-52
-
(2006)
Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, WI-IATW
, pp. 49-52
-
-
Claudino, E.C.1
Abdelouahab, Z.2
Teixeira, M.M.3
-
10
-
-
10444242731
-
TRINETR: An intrusion detection alert management system
-
Washington, DC, USA
-
Yu, J., Reddy, Y.V.R., Selliah, S., and et al.: TRINETR: An intrusion detection alert management system. In: Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'04), Washington, DC, USA (2004) pp. 235-240
-
(2004)
Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'04)
, pp. 235-240
-
-
Yu, J.1
Reddy, Y.V.R.2
Selliah, S.3
and et, al.4
-
11
-
-
74049101841
-
-
Nagios: http://www.nagios.org/.
-
-
-
-
12
-
-
11844253206
-
-
Laureano, M., Maziero, C., Jamhour, E.: Intrusion detection in virtual machine environments. In: EUROMICRO (2004) pp. 520-525
-
Laureano, M., Maziero, C., Jamhour, E.: Intrusion detection in virtual machine environments. In: EUROMICRO (2004) pp. 520-525
-
-
-
-
13
-
-
33745205813
-
Inferring internet denial-of-service activity
-
Moore, D., Shannon, C., Brown, D.J., and et al.: Inferring internet denial-of-service activity. ACM Transactions on Computer Systems (TOCS) 24(2) (2006) pp. 115-139
-
(2006)
ACM Transactions on Computer Systems (TOCS)
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
and et, al.4
-
14
-
-
74049098778
-
-
European Institute for Computer Antivirus Research EICAR
-
The Anti-Virus or Anti-Malware Test File: http://www.eicar.org/, European Institute for Computer Antivirus Research (EICAR) (2008)
-
(2008)
The Anti-Virus or Anti-Malware Test File
-
-
-
15
-
-
74049105766
-
-
Xen Project
-
Xen Project: http://www.xen.org/.
-
-
-
-
16
-
-
74049109108
-
-
Java Architecture for XML Binding (JAXB): http://java.sun.com/ developer/. Sun Developer Network (SDN) (2003)
-
Java Architecture for XML Binding (JAXB): http://java.sun.com/ developer/. Sun Developer Network (SDN) (2003)
-
-
-
-
17
-
-
70350660843
-
Implementing IDS Management on Lock-Keeper In: Proceedings of 5th Information Security Practice and Experience Conference (ISPEC'09)
-
Xi'an, China April
-
Cheng, F., Roschke, S., Meinel, Ch.: Implementing IDS Management on Lock-Keeper In: Proceedings of 5th Information Security Practice and Experience Conference (ISPEC'09), Springer LNCS 5451, Xi'an, China (April 2009) pp. 360-371
-
(2009)
Springer LNCS
, vol.5451
, pp. 360-371
-
-
Cheng, F.1
Roschke, S.2
Meinel, C.3
|