-
1
-
-
39649116293
-
"Network Traffic Anomaly Detection and Characterization"
-
A. Beach, M. Modaff, Y.Chen, "Network Traffic Anomaly Detection and Characterization", cs.northwestern.edu/~ajb200/anomaly%20detection%20paper%201.0.pdf.
-
-
-
Beach, A.1
Modaff, M.2
Chen, Y.3
-
2
-
-
33646735764
-
"An Approach to Understanding Policy Based on Autonomy and Voluntary Cooperation"
-
M. Burgess, "An Approach to Understanding Policy Based on Autonomy and Voluntary Cooperation", DSOM 2005, pp. 97-108.
-
(2005)
DSOM
, pp. 97-108
-
-
Burgess, M.1
-
3
-
-
84959039793
-
"Two Dimensional Time-Series for Anomaly Detection and Regulation in Adaptive Systems"
-
M. Burgess, "Two Dimensional Time-Series for Anomaly Detection and Regulation in Adaptive Systems", DSOM 2002, pp. 169-180.
-
(2002)
DSOM
, pp. 169-180
-
-
Burgess, M.1
-
4
-
-
84955563318
-
"Agentbased model of Computer Network Security System: A Case Study"
-
Springer Verlag, Berlin Heidelberg New York
-
V. Gorodetski, O. Karsaev, A. I. Khabalov, Kotenko, L. Popyack, V. Skormin, "Agentbased model of Computer Network Security System: A Case Study", In: Proceedings of International Workshop Mathematical Methods, Models and Architectures for Computer Network Security, Lecture Notes in Computer Science, vol. 2052, Springer Verlag, Berlin Heidelberg New York, 2001, pp. 39-50.
-
(2001)
Proceedings of International Workshop Mathematical Methods, Models and Architectures for Computer Network Security, Lecture Notes in Computer Science
, vol.2052
, pp. 39-50
-
-
Gorodetski, V.1
Karsaev, O.2
Khabalov, A.I.3
Kotenko4
Popyack, L.5
Skormin, V.6
-
7
-
-
33746583154
-
"Agent-based Approach for Distributed Intrusion Detection System Design"
-
United Kingdom
-
K Juszczyszyn, N.T. Nguyen, G. Kolaczek, A. Grzech, A. Pieczynska, R. Katarzyniak, "Agent-based Approach for Distributed Intrusion Detection System Design", International Conference on Computational Science 2006, United Kingdom, 2006, pp. 224-231.
-
(2006)
International Conference on Computational Science 2006
, pp. 224-231
-
-
Juszczyszyn, K.1
Nguyen, N.T.2
Kolaczek, G.3
Grzech, A.4
Pieczynska, A.5
Katarzyniak, R.6
-
8
-
-
33750701762
-
"Assessing the Uncertainty of Communication Patterns in Distributed Intrusion Detection System
-
K. Juszczyszyn, G. Kołaczek, "Assessing the Uncertainty of Communication Patterns in Distributed Intrusion Detection System", KES 2006, Lecture Notes in Artificial Intelligence 4252, 2006, pp. 243-250.
-
(2006)
KES 2006 Lecture Notes in Artificial Intelligence
, vol.4252
, pp. 243-250
-
-
Juszczyszyn, K.1
Kołaczek, G.2
-
9
-
-
33745317862
-
"A Mobile Agent Approach to Intrusion Detection in Network Systems"
-
G. Kolaczek, A. Kuchtiak-Pieczynska, K. Juszczyszyn, A. Grzech, R. Katarzynak, N.T. Nguyen, "A Mobile Agent Approach to Intrusion Detection in Network Systems", Lecture Notes in Artificial Intelligence 3682, 2005, pp. 514-519.
-
(2005)
Lecture Notes in Artificial Intelligence
, vol.3682
, pp. 514-519
-
-
Kolaczek, G.1
Kuchtiak-Pieczynska, A.2
Juszczyszyn, K.3
Grzech, A.4
Katarzynak, R.5
Nguyen, N.T.6
-
11
-
-
0043166339
-
"Anomaly detection in IP networks"
-
M. Thottan, C. Ji., "Anomaly detection in IP networks", IEEE Transactions on Signal Processing, 51(8), 2003, pp. 2191-2204.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.2
-
12
-
-
14944364840
-
"Characterization of Network-Wide Anomalies in Traffic Flows"
-
Boston University
-
A. Lakhina, M. Crovella, C. Diot, "Characterization of Network-Wide Anomalies in Traffic Flows", Technical Report BUCS-2004-020, Boston University, http://citeseer.ist.psu.edu/715839.html, 2004.
-
(2004)
Technical Report BUCS-2004-020
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
14
-
-
12244311689
-
"A taxonomy of computer worms"
-
ACM Press, New York, NY
-
N.Weaver, V. Paxson, S.Staniford, R. Cunningham, "A taxonomy of computer worms", ACM Workshop on Rapid Malcode - WORM '03, ACM Press, New York, NY, 2003, pp. 11-18.
-
(2003)
ACM Workshop on Rapid Malcode - WORM '03
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
15
-
-
33746582946
-
A First Look at Modern Enterprise Traffic
-
October
-
Allmanz M. et.al. A First Look at Modern Enterprise Traffic, In Proc. Internet Measurement Conference, October 2005, pp. 217-231.
-
(2005)
Proc. Internet Measurement Conference
, pp. 217-231
-
-
Allmanz, M.1
-
16
-
-
0033204106
-
On power-law relationships of the Internet topology
-
August
-
Faloutsos M., Faloutsos P., Faloutsos C., On power-law relationships of the Internet topology. In Proc.ACM SIGCOMM '99 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 1999, pp. 251-262.
-
(1999)
Proc. ACM SIGCOMM '99 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
17
-
-
0141650502
-
Observed Structure of Addresses in IP Traffic
-
November
-
Kohler E., Liy J., Paxson V., Shenker S., Observed Structure of Addresses in IP Traffic, In Proc. SIGCOMM Internet Measurement Workshop, November 2002, pp. 253-266.
-
(2002)
Proc. SIGCOMM Internet Measurement Workshop
, pp. 253-266
-
-
Kohler, E.1
Liy, J.2
Paxson, V.3
Shenker, S.4
-
18
-
-
35248845354
-
Multiscale Modeling Simulation of Worm Effects on the Internet Routing Infrastructure
-
Nicol D., Liljenstam M., Liu J., Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure, In Proc. Performance Tools Conference, 2003, pp. 1-10.
-
(2003)
Proc. Performance Tools Conference
, pp. 1-10
-
-
Nicol, D.1
Liljenstam, M.2
Liu, J.3
|