-
1
-
-
35048820538
-
APHIDS: A mobile agent-based programmable hybrid intrusion detection system
-
Deeter, K., Singh, K., Wilson, S., Filipozzi, and Vuong, S. (2004). APHIDS: A Mobile Agent-based Programmable Hybrid Intrusion Detection System. In Proceedings of the International Workshop on Mobility Aware Technologies and Applications MATA'04, Florianopolis, Bresil, pages 244-253.
-
(2004)
Proceedings of the International Workshop on Mobility Aware Technologies and Applications MATA'04, Florianopolis, Bresil
, pp. 244-253
-
-
Deeter, K.1
Singh, K.2
Filipozzi, W.S.3
Vuong, S.4
-
3
-
-
80052439768
-
LAMAIDS: A lightweight adaptive mobile agentbased intrusion detection system
-
Eid, M., Artail, H., Kayssi, A., and Chehab, A. (2008). LAMAIDS: A Lightweight Adaptive Mobile Agentbased Intrusion Detection System. International Journal of Network Security, 6(2):145-157.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.2
, pp. 145-157
-
-
Eid, M.1
Artail, H.2
Kayssi, A.3
Chehab, A.4
-
4
-
-
0020177941
-
RETE: A fast algorithm for the many pattern/many object pattern match problem
-
Forgy, C. (1982). RETE: A Fast Algorithm for the many Pattern/many Object Pattern match Problem. Artificial Intelligence, 19(1):17-37.
-
(1982)
Artificial Intelligence
, vol.19
, Issue.1
, pp. 17-37
-
-
Forgy, C.1
-
5
-
-
0038729639
-
Lightweight agents for intrusion detection
-
Helmer, G.,Wong, J., Honavar, V., Miller, L., and Wang, Y. (2003). Lightweight Agents for Intrusion Detection. Journal of Systems and Software, 67(2):109-122.
-
(2003)
Journal of Systems and Software
, vol.67
, Issue.2
, pp. 109-122
-
-
Helmer, G.1
Wong, J.2
Honavar, V.3
Miller, L.4
Wang, Y.5
-
6
-
-
77954528035
-
Multiagent systems for network intrusion detection: A review
-
Herrero, A. and Corchado, E. (2009). Multiagent Systems for Network Intrusion Detection: A Review. In Proceedings on the Computational International in Security for Information Systems, AISC 63, Berlin, Heidelberg, pages 143-154.
-
(2009)
Proceedings on the Computational International in Security for Information Systems, AISC 63, Berlin, Heidelberg
, pp. 143-154
-
-
Herrero, A.1
Corchado, E.2
-
7
-
-
0011066222
-
Applying mobile agents to intrusion detection and response
-
National Institute of Standards and Technology (NIST), Computer Security Division
-
Jansen, W.,Mell, P., Karygiannis, T., and Marks, D. (1999). Applying Mobile Agents to Intrusion Detection and Response. Nist interim report - 6416, National Institute of Standards and Technology (NIST), Computer Security Division.
-
(1999)
Nist Interim Report - 6416
-
-
Jansen, W.1
Mell, P.2
Karygiannis, T.3
Marks, D.4
-
8
-
-
78651583709
-
Agent IDS based on misuse approach
-
Ktata, F. B., Kadhi, N. E., and Ghèdira, K. (2009). Agent IDS based on Misuse Approach. Journal of Software, 4(6):495-507.
-
(2009)
Journal of Software
, vol.4
, Issue.6
, pp. 495-507
-
-
Ktata, F.B.1
Kadhi, N.E.2
Ghèdira, K.3
-
9
-
-
10444274050
-
MA-IDS architecture for distributed intrusion detection using mobile agents
-
Li, C., Song, Q., and Zhang, C. (2004). MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agents. In Proceedings of the 2nd International Conference on Information Technology for Application (ICITA 2004), Harbin, China, pages 451-455.
-
(2004)
Proceedings of the 2nd International Conference on Information Technology for Application (ICITA 2004), Harbin, China
, pp. 451-455
-
-
Li, C.1
Song, Q.2
Zhang, C.3
-
11
-
-
60449088978
-
A SNORT-based agent for a JADE multiagent intrusion detection system
-
Mosqueira-Rey, E., Alonso-Betanzos, A., Guijarro-Berdinas, B., Alonso-Ríos, D., and Lago-Pineiro, J. (2009). A SNORT-based Agent for a JADE Multiagent Intrusion Detection System. International Journal of Intelligent Information and Database Systems, 3(1):107-121.
-
(2009)
International Journal of Intelligent Information and Database Systems
, vol.3
, Issue.1
, pp. 107-121
-
-
Mosqueira-Rey, E.1
Alonso-Betanzos, A.2
Guijarro-Berdinas, B.3
Alonso-Ríos, D.4
Lago-Pineiro, J.5
-
13
-
-
0003539116
-
Snort lightweight intrusion detection system for networks
-
Roesch, M. (1999). Snort Lightweight Intrusion Detection System for Networks. In Proceedings of USENIX LISA'99.
-
(1999)
Proceedings of USENIX LISA'99
-
-
Roesch, M.1
-
16
-
-
80052447018
-
Mobile agents for network intrusion resistance
-
Wang, H., Wang, Z., Zhao, Q., Wang, G., Zheng, R., and Liu, D. (2006). Mobile Agents for Network Intrusion Resistance. In Proceedings of the International Workshops on Advanced Web and Network Technologies, and Applications, APWeb 2006, Harbin, China, pages 967-970.
-
(2006)
Proceedings of the International Workshops on Advanced Web and Network Technologies, and Applications, APWeb 2006, Harbin, China
, pp. 967-970
-
-
Wang, H.1
Wang, Z.2
Zhao, Q.3
Wang, G.4
Zheng, R.5
Liu, D.6
-
17
-
-
72849122830
-
-
Ye, X.-L., Zhang, Y.-C., Zhang, C.-L., Chen, C., and Huang, X.-Y. (2009). A Mobile Agent and Snort Based Distributed Intrusion Detection System. pages 281-285.
-
(2009)
A Mobile Agent and Snort Based Distributed Intrusion Detection System
, pp. 281-285
-
-
Ye, X.-L.1
Zhang, Y.-C.2
Zhang, C.-L.3
Chen, C.4
Huang, X.-Y.5
|