-
1
-
-
27844590384
-
A Survey on Wireless Mesh Networking
-
I. Akyildiz and X. Wang, "A Survey on Wireless Mesh Networking," Communications Magazine, IEEE, vol. 43, pp. S23-S30, 2005.
-
(2005)
Communications Magazine, IEEE
, vol.43
, pp. S23-S30
-
-
Akyildiz, I.1
Wang, X.2
-
2
-
-
33646677214
-
Emerging standards for wireless mesh technology
-
M. J. Lee, J. Zheng, Y. B. Ko, and D. M. Shrestha, "Emerging standards for wireless mesh technology," Wireless Communications, IEEE [see also IEEE Personal Communications], vol. 13, pp. 56-63, 2006.
-
(2006)
Wireless Communications, IEEE [see also IEEE Personal Communications]
, vol.13
, pp. 56-63
-
-
Lee, M.J.1
Zheng, J.2
Ko, Y.B.3
Shrestha, D.M.4
-
5
-
-
0029267472
-
State Transition Analysis: A Rule-Based Intrusion Detection Approach
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State Transition Analysis: A Rule-Based Intrusion Detection Approach," IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, pp. 181-199, 1995.
-
(1995)
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
6
-
-
77955595449
-
Wavelet-based real time detection of network traffic anomalies
-
Baltimore, MD, USA
-
C. T. Huang, S. Thareja, and Y. J. Shin, "Wavelet-based real time detection of network traffic anomalies," in Workshop on Enterprise Network Security and the 2nd International Conference on Security and Privacy in Communication Networks, Baltimore, MD, USA, 2006, pp. 1-7.
-
(2006)
Workshop on Enterprise Network Security and the 2nd International Conference on Security and Privacy in Communication Networks
, pp. 1-7
-
-
Huang, C.T.1
Thareja, S.2
Shin, Y.J.3
-
7
-
-
33845536096
-
Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data
-
S. S. Kim, A. L. N. Reddy, and M. Vannucci, "Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data," LECTURE NOTES IN COMPUTER SCIENCE, pp. 1047-1059, 2004.
-
(2004)
LECTURE NOTES IN COMPUTER SCIENCE
, pp. 1047-1059
-
-
Kim, S.S.1
Reddy, A.L.N.2
Vannucci, M.3
-
8
-
-
79955406515
-
POLVO-IIDS: Um Sistema de Detecçao de Intrusao Inteligente Baseado em Anomalias
-
Gramado
-
P. M. Mafra, J. da Silva Fraga, V. Moll, and A. O. Santin, "POLVO-IIDS: Um Sistema de Detecçao de Intrusao Inteligente Baseado em Anomalias," in SBSeg2008, Gramado, 2008, pp. 201-214.
-
(2008)
SBSeg2008
, pp. 201-214
-
-
Mafra, P.M.1
da Silva Fraga, J.2
Moll, V.3
Santin, A.O.4
-
10
-
-
35148840623
-
Detecting Denial-of-Service attacks using the wavelet transform
-
M. Hamdi and N. Boudriga, "Detecting Denial-of-Service attacks using the wavelet transform," Computer Communications vol. 30, p. 10, 2007.
-
(2007)
Computer Communications
, vol.30
, pp. 10
-
-
Hamdi, M.1
Boudriga, N.2
-
11
-
-
51849117294
-
Application of Wavelet Packet Transform to Network Anomaly Detection
-
St. Petersburg, Russia
-
C. Callegari, S. Giordano, and M. Pagano, "Application of Wavelet Packet Transform to Network Anomaly Detection," in Next Generation Teletraffic and Wired/Wireless Advanced Networking: 8th International Conference, NEW2AN 2008 and RuSMART, St. Petersburg, Russia, 2008, p. 246.
-
(2008)
Next Generation Teletraffic and Wired/Wireless Advanced Networking: 8th International Conference, NEW2AN 2008 and RuSMART
, pp. 246
-
-
Callegari, C.1
Giordano, S.2
Pagano, M.3
-
13
-
-
33847406678
-
A hierarchical intrusion detection model based on the PCA neural networks
-
G. Liu, Z. Yi, and S. Yang, "A hierarchical intrusion detection model based on the PCA neural networks," Neurocomputing, vol. 70, pp. 1561-1568, 2007.
-
(2007)
Neurocomputing
, vol.70
, pp. 1561-1568
-
-
Liu, G.1
Yi, Z.2
Yang, S.3
-
14
-
-
27544493249
-
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack
-
Yokohama, Japan, June
-
S. Panjwani, S. Tan, K. M. Jarrin, and M. Cukier, "An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack," in International Conference on Dependable Systems and Networks (DSN-2005), Yokohama, Japan, June, 2005, pp. 602-611.
-
(2005)
International Conference on Dependable Systems and Networks (DSN-2005)
, pp. 602-611
-
-
Panjwani, S.1
Tan, S.2
Jarrin, K.M.3
Cukier, M.4
-
15
-
-
0033362601
-
Evolving artificial neural networks
-
X. Yao, "Evolving artificial neural networks," Proceedings of the IEEE, vol. 87, pp. 1423-1447, 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, pp. 1423-1447
-
-
Yao, X.1
-
16
-
-
0026927426
-
Multilayer perceptron, fuzzy sets, and classification
-
S. K. Pal and S. Mitra, "Multilayer perceptron, fuzzy sets, and classification," Neural Networks, IEEE Transactions on, vol. 3, pp. 683-697, 1992.
-
(1992)
Neural Networks, IEEE Transactions on
, vol.3
, pp. 683-697
-
-
Pal, S.K.1
Mitra, S.2
-
17
-
-
0037882105
-
The Design and Implementations of the NCTUns 1.0 Network Simulator
-
S. Y. Wang, C. L. Chou, C. H. Huang, C. C. Hwang, Z. M. Yang, C. C. Chiou, and C. C. Lin, "The Design and Implementations of the NCTUns 1.0 Network Simulator," Computer Networks, vol. 42, pp. 175-197, 2003.
-
(2003)
Computer Networks
, vol.42
, pp. 175-197
-
-
Wang, S.Y.1
Chou, C.L.2
Huang, C.H.3
Hwang, C.C.4
Yang, Z.M.5
Chiou, C.C.6
Lin, C.C.7
-
18
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, "The 1999 DARPA off-line intrusion detection evaluation," Computer Networks, vol. 34, pp. 579-595, 2000.
-
(2000)
Computer Networks
, vol.34
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
19
-
-
33750937412
-
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System
-
D. Bolzoni, E. Zambon, S. Etalle, and P. Hartel, "POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System," in Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA), 2006, pp. 144-156.
-
(2006)
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA)
, pp. 144-156
-
-
Bolzoni, D.1
Zambon, E.2
Etalle, S.3
Hartel, P.4
|