-
2
-
-
79958784371
-
-
Available:, Last accessed Oct. 15, 2010
-
"ZDnet." Available: http://www.zdnet.com/blog/security/ confickers-estimated-economic-cost-91-billion/3207 [Last accessed Oct. 15, 2010].
-
ZDnet.
-
-
-
4
-
-
76549120876
-
-
M. Ahamad, D. Amster, M. Barrett, T. Cross, G. Heron, D. Jackson, J. King, W. Lee, R. Naraine, G. Ollmann et al., "Emerging cyber threats report for 2009", 2008.
-
(2008)
Emerging Cyber Threats Report for 2009
-
-
Ahamad, M.1
Amster, D.2
Barrett, M.3
Cross, T.4
Heron, G.5
Jackson, D.6
King, J.7
Lee, W.8
Naraine, R.9
Ollmann, G.10
-
5
-
-
35048879637
-
Honey stat: Local worm detection using honeypots
-
D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levine, and H. Owen, "Honeystat: local worm detection using honeypots", Recent Advances in Intrusion Detection. Springer, 2004, pp. 39-58. (Pubitemid 39741887)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3224
, pp. 39-58
-
-
Dagon, D.1
Qin, X.2
Gu, O.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
6
-
-
70349977426
-
A game-theoretical approach to incentive design in collaborative intrusion detection networks
-
May
-
Q. Zhu, C. Fung, R. Boutaba, and T. Başar, "A game-theoretical approach to incentive design in collaborative intrusion detection networks", in Proc. International Symp. Game Theory Netw., May 2009.
-
(2009)
Proc. International Symp. Game Theory Netw.
-
-
Zhu, Q.1
Fung, C.2
Boutaba, R.3
Başar, T.4
-
10
-
-
0002101577
-
Reputation systems
-
P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman, "Reputation systems", Commun. ACM, vol. 43, no. 12, pp. 45-48, 2000.
-
(2000)
Commun. ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
11
-
-
70350552071
-
Trust management for host-based collaborative intrusion detection
-
C. Fung, O. Baysal, J. Zhang, I. Aib, and R. Boutaba, "Trust management for host-based collaborative intrusion detection", in 19th IFIP/IEEE International Workshop Distributed Syst., 2008.
-
(2008)
19th IFIP/IEEE International Workshop Distributed Syst.
-
-
Fung, C.1
Baysal, O.2
Zhang, J.3
Aib, I.4
Boutaba, R.5
-
12
-
-
84890372682
-
A trustaware, p2p-based overlay for intrusion detection
-
C. Duma, M. Karresand, N. Shahmehri, and G. Caronni, "A trustaware, p2p-based overlay for intrusion detection", in International Conf. Database Expert Syst. Appl., 2006.
-
(2006)
International Conf. Database Expert Syst. Appl.
-
-
Duma, C.1
Karresand, M.2
Shahmehri, N.3
Caronni, G.4
-
16
-
-
70449403415
-
Robust and scalable trust management for collaborative intrusion detection
-
C. Fung, J. Zhang, I. Aib, and R. Boutaba, "Robust and scalable trust management for collaborative intrusion detection", in Proc. Eleventh IFIP/IEEE International Symp. Integrated Netw. Management, 2009.
-
(2009)
Proc. Eleventh IFIP/IEEE International Symp. Integrated Netw. Management
-
-
Fung, C.1
Zhang, J.2
Aib, I.3
Boutaba, R.4
-
18
-
-
84867339043
-
Alert correlation in a cooperative intrusion detection framework
-
F. Cuppens and A. Miege, "Alert correlation in a cooperative intrusion detection framework", in Proc. IEEE Symp. Security Privacy, 2002.
-
(2002)
Proc. IEEE Symp. Security Privacy
-
-
Cuppens, F.1
Miege, A.2
-
19
-
-
39049089570
-
-
Available
-
J. Ullrich, "DShield." Available: http://www.dshield.org/ indexd.html.
-
DShield.
-
-
Ullrich, J.1
-
20
-
-
20844436808
-
Collaborative internet worm containment
-
DOI 10.1109/MSP.2005.63
-
M. Cai, K. Hwang, Y. Kwok, S. Song, and Y. Chen, "Collaborative Internet worm containment", IEEE Security Privacy, vol. 3, no. 3, pp. 25-33, 2005. (Pubitemid 40860470)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 25-33
-
-
Cai, M.1
Hwang, K.2
Kwok, Y.-K.3
Song, S.4
Chen, Y.5
-
21
-
-
51349149626
-
ALPACAS: A large-scale privacyaware collaborative anti-spam system
-
Z. Zhong, L. Ramaswamy, and K. Li, "ALPACAS: a large-scale privacyaware collaborative anti-spam system", in Proc. IEEE INFOCOM, 2008.
-
(2008)
Proc. IEEE INFOCOM
-
-
Zhong, Z.1
Ramaswamy, L.2
Li, K.3
-
25
-
-
0003839495
-
-
Ph. D. thesis, Department of Mathematics and Computer Science, University of Stirling
-
S. Marsh, "Formalising trust as a computational concept", Ph. D. thesis, Department of Mathematics and Computer Science, University of Stirling, 1994.
-
(1994)
Formalising Trust as a Computational Concept
-
-
Marsh, S.1
-
26
-
-
4544220420
-
Improving user satisfaction in agent-based electronic marketplaces by reputation modeling and adjustable product quality
-
T. Tran and R. Cohen, "Improving user satisfaction in agent-based electronic marketplaces by reputation modeling and adjustable product quality", in Proc. Third International Joint Conf. Autonomous Agents Multiagent Syst., 2004.
-
(2004)
Proc. Third International Joint Conf. Autonomous Agents Multiagent Syst.
-
-
Tran, T.1
Cohen, R.2
-
27
-
-
28444463801
-
Filtering out unfair ratings in Bayesian reputation systems
-
Feb
-
A. Whitby, A. Jøsang, and J. Indulska, "Filtering out unfair ratings in Bayesian reputation systems", Icfain J. Management Research, pp. 48-64, Feb. 2005.
-
(2005)
Icfain J. Management Research
, pp. 48-64
-
-
Whitby, A.1
Jøsang, A.2
Indulska, J.3
-
28
-
-
33644799603
-
Coping with inaccurate reputation sources: Experimental analysis of a probabilistic trust model
-
W. T. L. Teacy, J. Patel, N. R. Jennings, and M. Luck, "Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model", in Proc. Fourth International Autonomous Agents Multiagent Syst., 2005.
-
(2005)
Proc. Fourth International Autonomous Agents Multiagent Syst.
-
-
Teacy, W.T.L.1
Patel, J.2
Jennings, N.R.3
Luck, M.4
-
30
-
-
39049164287
-
Trust evaluation in anarchy: A case study on autonomous networks
-
T. Jiang and J. Baras, "Trust evaluation in anarchy: a case study on autonomous networks", in IEEE INFOCOM, 2006.
-
(2006)
IEEE INFOCOM
-
-
Jiang, T.1
Baras, J.2
-
31
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
Y. Sun, Z. Han, W. Yu, and K. Liu, "A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks", in IEEE INFOCOM, 2006.
-
(2006)
IEEE INFOCOM
-
-
Sun, Y.1
Han, Z.2
Yu, W.3
Liu, K.4
-
32
-
-
34047150751
-
Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing
-
A. Rahbar and O. Yang, "Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing", IEEE Trans. Parallel Distributed Syst., vol. 18, no. 4, pp. 460-473, 2007.
-
(2007)
IEEE Trans. Parallel Distributed Syst.
, vol.18
, Issue.4
, pp. 460-473
-
-
Rahbar, A.1
Yang, O.2
-
33
-
-
33646831908
-
TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks
-
M. Srivatsa, L. Xiong, and L. Liu, "TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks", in Proc. 14th International Conf. World Wide Web, 2005.
-
(2005)
Proc. 14th International Conf. World Wide Web
-
-
Srivatsa, M.1
Xiong, L.2
Liu, L.3
-
34
-
-
29244455299
-
Peer-to-peer's most wanted: Malicious peers
-
DOI 10.1016/j.comnet.2005.07.025, PII S1389128605002197
-
L. Mekouar, Y. Iraqi, and R. Boutaba, "Peer-to-peer's most wanted: malicious peers", Comput. Netw., vol. 50, no. 4, pp. 545-562, 2006. (Pubitemid 41828405)
-
(2006)
Computer Networks
, vol.50
, Issue.4
, pp. 545-562
-
-
Mekouar, L.1
Iraqi, Y.2
Boutaba, R.3
-
35
-
-
34548211355
-
A fine-grained reputation system for reliable service selection in peer-to-peer networks
-
DOI 10.1109/TPDS.2007.1043
-
Y. Zhang and Y. Fang, "A fine-grained reputation system for reliable service selection in peer-to-peer networks", IEEE Trans. Parallel Distributed Syst., pp. 1134-1145, 2007. (Pubitemid 47315994)
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.8
, pp. 1134-1145
-
-
Zhang, Y.1
Fang, Y.2
|