-
1
-
-
77953208377
-
-
USC Information Sciences Institute
-
USC Information Sciences Institute. NS-2 network simulator 2.31. http://www.isi.edu/nsnam/ns/doc/ns-doc.pdf (accessed 07/15/2008.
-
NS-2 Network Simulator 2.31
-
-
-
2
-
-
33846694887
-
Advanced concepts in large-scale network simulation
-
Nicol, D.M., M. Liljenstam and J. Liu. 2005. Advanced concepts in large-scale network simulation. In M.E. Kuhl, N.M. Steiger, F. Armstrong and J.A. Joines, Eds, 37th Winter Simulation Conference, ACM Press, New York, pp. 153-166.
-
37th Winter Simulation Conference
-
-
Nicol, D.M.1
Liljenstam, M.2
Liu, J.3
-
3
-
-
0035009293
-
A study of networks simulation efficiency: Fluid simulation vs. packet-level simulation
-
Liu, B., D.R. Figueiredo, Y. Guo, J. Kurose and D. Towsley. 2001. A study of networks simulation efficiency: Fluid simulation vs. packet-level simulation. In INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, Vol. 3, pp. 1244-1253.
-
INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings
-
-
Liu, B.1
Figueiredo, D.R.2
Guo, Y.3
Kurose, J.4
Towsley, D.5
-
7
-
-
33646393232
-
Rinse: The real-time immersive network simulation environment for network security exercises (extended version)
-
Liljenstam, M., J. Liu, D.M. Nicol, Y. Yuan, G. Yan and C. Grier. 2006. RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version). Simulation, 82 (1). 43-59.
-
(2006)
Simulation
, vol.82
, Issue.1
, pp. 43-59
-
-
Liljenstam, M.1
Liu, J.2
Nicol, D.M.3
Yuan, Y.4
Yan, G.5
Grier, C.6
-
8
-
-
84902996321
-
A scalable, ordered scenario-based network security simulator
-
Yun, J.B., E.K. Park, E.G. Im and H.P. In. 2005. A scalable, ordered scenario-based network security simulator. In Systems Modeling and Simulation: Theory and Applications (Lecture Notes in Computer Science, Vol. 3389), Springer, Berlin, pp. 487-494.
-
Systems Modeling and Simulation: Theory and Applications (Lecture Notes in Computer Science)
, vol.3389
-
-
Yun, J.B.1
Park, E.K.2
Im, E.G.3
In, H.P.4
-
13
-
-
0002410573
-
Agent-based telematic services and telecom applications
-
Fricke, S., K. Bsufka, J. Keiser, T. Schmidt, R. Sesseler and S. Albayrak. 2001. Agent-based telematic services and telecom applications. Communications of the ACM, 44 (4). 43-48.
-
(2001)
Communications of the ACM
, vol.44
, Issue.4
, pp. 43-48
-
-
Fricke, S.1
Bsufka, K.2
Keiser, J.3
Schmidt, T.4
Sesseler, R.5
Albayrak, S.6
-
15
-
-
0027961889
-
Selfnonself discrimination in a computer
-
Forrest, S., A.S. Perelson, L. Allen and R. Cherukuri. 1994. Selfnonself discrimination in a computer. In Proceedings of the IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA, pp. 202-212.
-
Proceedings of the IEEE Symposium on Research in Security and Privacy
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
16
-
-
38349070683
-
Decentralized detector generation in cooperative intrusion detection systems
-
Bye, R., K. Luther, S.A. Camtepe, T. Alpcan, S. Albayrak and B. Yener. 2008. Decentralized detector generation in cooperative intrusion detection systems. In S. Masuzawa and T. Tixeuil, Eds, Stabilization, Safety, and Security of Distributed Systems 9th International Symposium, SSS 2007 Paris, France, November 14-16, 2007 Proceedings (Lecture Notes in Computer Science, Vol. 4838), Springer, Berlin.
-
Stabilization, Safety, and Security of Distributed Systems 9th International Symposium, SSS 2007 Paris, France, November 14-16, 2007 Proceedings (Lecture Notes in Computer Science)
, vol.4838
-
-
Bye, R.1
Luther, K.2
Camtepe, S.A.3
Alpcan, T.4
Albayrak, S.5
Yener, B.6
-
17
-
-
0035648637
-
A faster algorithm for betweenness centrality
-
Brandes, U. 2001. A faster algorithm for betweenness centrality. Journal of Mathematical Sociology, 25 (2). 163-177.
-
(2001)
Journal of Mathematical Sociology
, vol.25
, Issue.2
, pp. 163-177
-
-
Brandes, U.1
-
18
-
-
43049167460
-
Malware filtering for network security using weighted optimality measures
-
Bloem, M., T. Alpean, S. Schmidt and T. Basar. 2007. Malware filtering for network security using weighted optimality measures. In IEEE International Conference on Control Applications, 2007. CCA 2007, pp. 295-300.
-
IEEE International Conference on Control Applications, 2007
-
-
Bloem, M.1
Alpean, T.2
Schmidt, S.3
Basar, T.4
-
20
-
-
77953200054
-
A monitor placement game for intrusion detection
-
Schmidt, S., T. Alpcan, S. Albayrak and A. Müller. 2007. A monitor placement game for intrusion detection. In Proceedings of CRITIS, 2nd International Workshop on Critical Information Infrastructures Security (Lecture Notes in Computer Science), 5141, Springer, Berlin.
-
Proceedings of CRITIS, 2nd International Workshop on Critical Information Infrastructures Security (Lecture Notes in Computer Science), 5141
-
-
Schmidt, S.1
Alpcan, T.2
Albayrak, S.3
Müller, A.4
-
21
-
-
36749033067
-
Fast algorithm for successive computation of group betweenness centrality
-
Puzis, R., Y. Elovici and S. Dolev. 2007. Fast algorithm for successive computation of group betweenness centrality. Physical Review E (Statistical, Nonlinear, and Soft Matter Physics), 76 (5). 05670 9.
-
(2007)
Physical Review e (Statistical, Nonlinear, and Soft Matter Physics)
, vol.76
, Issue.5
, pp. 056709
-
-
Puzis, R.1
Elovici, Y.2
Dolev, S.3
-
22
-
-
41549097717
-
On variants of shortest-path betweenness centrality and their generic computation
-
Brandes, U. 2008. On variants of shortest-path betweenness centrality and their generic computation. Social Networks, 30 (2). 136-145.
-
(2008)
Social Networks
, vol.30
, Issue.2
, pp. 136-145
-
-
Brandes, U.1
-
23
-
-
85117735487
-
A general cooperative intrusion detection architecture for manets
-
Sterne, D., P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C.-Y. Tseng and T. Bowen. 2005. A general cooperative intrusion detection architecture for manets. In Proceedings of the Third IEEE International Workshop on Information Assurance, pp. 57-70.
-
Proceedings of the Third IEEE International Workshop on Information Assurance
-
-
Sterne, D.1
Balasubramanyam, P.2
Carman, D.3
Wilson, B.4
Talpade, R.5
Ko, C.6
Balupari, R.7
Tseng, C.-Y.8
Bowen, T.9
-
25
-
-
70349937411
-
-
Technische Universität Berlin, DAI-Labor, August
-
Bye, R. and S. Albayrak. CIMD - Collaborative Intrusion and Malware Detection, Technical Report TUB-DAI 08/08-01, Technische Universität Berlin, DAI-Labor, August 2008, http://www.dai-labor.de.
-
(2008)
CIMD - Collaborative Intrusion and Malware Detection, Technical Report TUB-DAI 08/08-01
-
-
Bye, R.1
Albayrak, S.2
-
26
-
-
0034546374
-
Architecture for an artificial immune system
-
Hofmeyr, S. and S. Forrest. 2000. Architecture for an artificial immune system. Evolutionary Computation Journal, 8 (4). 443-473.
-
(2000)
Evolutionary Computation Journal
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyr, S.1
Forrest, S.2
-
27
-
-
0033683805
-
A computer host-based user anomaly detection system using the self-organizing map
-
Höglund, A.J., K. Hätönen and A.S. Sorvari. 2000. A computer host-based user anomaly detection system using the self-organizing map. In IJCNN '00: Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN'00), Vol. 5, IEEE Computer Society, Washington, DC, p. 5411.
-
IJCNN '00: Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN'00)
, vol.5
-
-
Höglund, A.J.1
Hätönen, K.2
Sorvari, A.S.3
|