-
1
-
-
78049393537
-
-
Internet Service Providers' Association, 'What is Spam?', April
-
Internet Service Providers' Association, 'What is Spam?' (2008), http://www.ispa.org.za/spam/whatisspam.shtml (April 2009)
-
(2008)
-
-
-
3
-
-
78049396044
-
-
Security vision from mcFee avert labs
-
Security Vision from McFee Avert Labs, The Future of Security (2007)
-
(2007)
The Future of Security
-
-
-
4
-
-
78049398258
-
-
McFee
-
McFee (2010), http://vil.mcafeesecurity.com/vil/content/v-138726.htm
-
(2010)
-
-
-
5
-
-
78049402812
-
The advanced computing systems association
-
April
-
Cooke, E., Jahanian, F., McPherson, D.: The advanced computing systems association. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets (2005), http://www.usenix.org/events/sruti05/tech/full-papers/cooke/ cooke-html/(April 2009)
-
(2005)
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
6
-
-
78049383414
-
-
Economist "Big brother bosses", September 11, September 2009
-
The Economist "Big brother bosses" (September 11, 2009), http://www.economist.com/businessfinance/displaystory.cfm?story-id=14413380 (September 2009)
-
(2009)
-
-
-
7
-
-
33750942717
-
3G mobile networks
-
limited edn. Tata MCGraw-Hill Publishing Company, New York
-
Kasera, S., Narang, N.: 3G Mobile Networks. Architecture, Protocols and Procedure, limited edn. Tata MCGraw-Hill Publishing Company, New York (2005)
-
(2005)
Architecture, Protocols and Procedure
-
-
Kasera, S.1
Narang, N.2
-
8
-
-
0032124041
-
Mobility and security management in the gsm system and some proposed future improvements
-
Mehrotra, A., Golding, L. S.: Mobility and security management in the gsm system and some proposed future improvements. Proceedings of the IEEE 86(7), 1480-1497 (1998)
-
(1998)
Proceedings of the IEEE
, vol.86
, Issue.7
, pp. 1480-1497
-
-
Mehrotra, A.1
Golding, L.S.2
-
12
-
-
78049389884
-
-
Information Security Magazine, "Network Security", September
-
Information Security Magazine, "Network Security", http://searchsecurity.techtarget.com/sDefinition/0sid-gci859579.00.html (September 2009)
-
(2009)
-
-
-
13
-
-
1542492748
-
Identifying significant features for network forensic analysis using artificial intelligent techniques
-
Mukkamala, S., Sung, A. H.: Identifying significant features for network forensic analysis using artificial intelligent techniques. Int'l Journal of Digital Evidence 1(4), 1-7 (2003)
-
(2003)
Int'l Journal of Digital Evidence
, vol.1
, Issue.4
, pp. 1-7
-
-
Mukkamala, S.1
Sung, A.H.2
-
14
-
-
78049408526
-
-
Web Security, Privacy & Commerce, 2nd edn
-
Garfinkel, S.: Web Security, Privacy & Commerce, 2nd edn, http://www.oreillynet.com/pub/a/network/2002/04/26/nettap.html
-
-
-
Garfinkel, S.1
-
15
-
-
33745495364
-
Sms communications analysis: How to use computational intelligence methods and tools?
-
March 31-April 1
-
Negnevitsky, M., Lim, M. J.-H., Hartnett, J., Reznik, L.: Sms Communications Analysis: How to use Computational Intelligence Methods and Tools? In: Proceedings of the 2005 IEEE International Conference Computational Intelligence for Homeland Security and Personal Safety, CIHSPS 2005, March 31-April 1, pp. 16-23 (2005)
-
(2005)
Proceedings of the 2005 IEEE International Conference Computational Intelligence for Homeland Security and Personal Safety, CIHSPS 2005
, pp. 16-23
-
-
Negnevitsky, M.1
Lim, M.J.-H.2
Hartnett, J.3
Reznik, L.4
-
17
-
-
33745501614
-
Neural network based anomaly detection in computer networks: A novel training paradigm
-
Las Vegas, NV, ISCA, Cary
-
Sharafat, R., Rasti, M., Yazdian, A.: Neural network based anomaly detection in computer networks: a novel training paradigm. In: ISCA 16th International Conference: Computer Applications in Industry and Engineering, Las Vegas, NV, pp. 50-53. ISCA, Cary (2003)
-
(2003)
ISCA 16th International Conference: Computer Applications in Industry and Engineering
, pp. 50-53
-
-
Sharafat, R.1
Rasti, M.2
Yazdian, A.3
-
20
-
-
84867739760
-
A fuzzy approach for detecting anomalous behaviour in e-mail traffic
-
Valli, C., Woodward, A. eds., School of Computer and Information Science, Edith Cowan University, Perth
-
Lim, M. J.-H., Negnevitsky, M., Hartnett, J.: A fuzzy approach for detecting anomalous behaviour in e-mail traffic. In: Valli, C., Woodward, A. (eds.) 4th Australian Digital Forensics Conference, pp. 36-49. School of Computer and Information Science, Edith Cowan University, Perth (2006)
-
(2006)
4th Australian Digital Forensics Conference
, pp. 36-49
-
-
Lim, M.J.-H.1
Negnevitsky, M.2
Hartnett, J.3
-
23
-
-
0035792373
-
Fuzzy intrusion detection
-
Dickerson, J. E., Juslin, J., Koukousoula, O., Dickerson, J. A.: Fuzzy intrusion detection. In: Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference, vol. 3, pp. 1506-1510 (2001)
-
(2001)
Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference
, vol.3
, pp. 1506-1510
-
-
Dickerson, J.E.1
Juslin, J.2
Koukousoula, O.3
Dickerson, J.A.4
-
24
-
-
26444432363
-
Fuzzy logic-based diagnosis of traffic anomalies in voice networks
-
Butto, M., Naldi, M., Neri, A.: Fuzzy logic-based diagnosis of traffic anomalies in voice networks. Journal of Network and Systems Management 9(2), 161-182 (2001)
-
(2001)
Journal of Network and Systems Management
, vol.9
, Issue.2
, pp. 161-182
-
-
Butto, M.1
Naldi, M.2
Neri, A.3
-
25
-
-
0038537231
-
An immuno-fuzzy approachto anomaly detection
-
Gomez, J., Gonzalez, F., Dasgupta, D.: An immuno-fuzzy approachto anomaly detection. In: 12th IEEE International Conference on Fuzzy Systems, vol. 2, pp. 1219-1224 (2003)
-
(2003)
12th IEEE International Conference on Fuzzy Systems
, vol.2
, pp. 1219-1224
-
-
Gomez, J.1
Gonzalez, F.2
Dasgupta, D.3
|