-
1
-
-
51349093483
-
A novel quantitative approach formeasuring network security
-
IEEE
-
M.S. Ahmed, E.Al-Shaer and L.Khan, A Novel Quantitative Approach ForMeasuring Network Security, In INFOCOM, pages 1957-1965. IEEE, 2008.
-
(2008)
INFOCOM
, pp. 1957-1965
-
-
Ahmed, M.S.1
Al-Shaer, E.2
Khan, L.3
-
2
-
-
35248825128
-
Danger theory: The link between AIS and IDS?
-
J. Timmis, P.J. Bentley and E. Hart, eds of Lecture Notes in Computer Science Springer
-
U. Aickelin, P.J. Bentley, S. Cayzer, J. Kim and J. McLeod, Danger Theory: The Link between AIS and IDS? in: ICARIS, J. Timmis, P.J. Bentley and E. Hart, eds, volume 2787 of Lecture Notes in Computer Science, pages 147-155. Springer, 2003.
-
(2003)
ICARIS
, vol.2787
, pp. 147-155
-
-
Aickelin, U.1
Bentley, P.J.2
Cayzer, S.3
Kim, J.4
McLeod, J.5
-
3
-
-
0010942406
-
-
South-Western Pub, Cincinnati, Ohio
-
D.R. Anderson, D.J. Sweeney and T.A. Williams, Quantitative methods for business, South-Western Pub, Cincinnati, Ohio, 2000.
-
(2000)
Quantitative Methods for Business
-
-
Anderson, D.R.1
Sweeney, D.J.2
Williams, T.A.3
-
4
-
-
70849088841
-
-
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA
-
M.A. Bishop, The Art and Science of Computer Security, Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2002.
-
(2002)
The Art and Science of Computer Security
-
-
Bishop, M.A.1
-
7
-
-
0004568554
-
A review of port scanning techniques
-
M. de Vivo, E. Carrasco, G. Isern and G.O. de Vivo, A review of port scanning techniques, Computer Communication Review 29(2) (1999), 41-48. (Pubitemid 129669578)
-
(1999)
Computer Communication Review
, vol.29
, Issue.2
, pp. 41-48
-
-
De Vivo, M.1
Carrasco, E.2
Isern, G.3
De Vivo, G.O.4
-
8
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
Trent Jaeger and Elena Ferrari, editors ACM
-
N. Dimmock, A. Belokosztolszki, D.M. Eyers, J. Bacon and K. Moody, Using trust and risk in role-based access control policies, In Trent Jaeger and Elena Ferrari, editors, SACMAT, pages 156-162. ACM, 2004.
-
(2004)
SACMAT
, pp. 156-162
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.M.3
Bacon, J.4
Moody, K.5
-
9
-
-
77952316216
-
Accurate mobility modeling and location prediction based on pattern analysis of handover series in mobile networks
-
P. F̈ul̈op, S. Imre, S. Szab́o and T. Sźalka, Accurate mobility modeling and location prediction based on pattern analysis of handover series in mobile networks, Mobile Information Systems 5(3) (2009), 255-289.
-
(2009)
Mobile Information Systems
, vol.5
, Issue.3
, pp. 255-289
-
-
F̈ul̈op, P.1
Imre, S.2
Szab́o, S.3
Sźalka, T.4
-
10
-
-
78650922496
-
Extending mobility to publish/subscribe systems using a pro-active caching approach
-
A. Gaddah and T. Kunz, Extending mobility to publish/subscribe systems using a pro-active caching approach, Mobile Information Systems 6(4) (2010), 293-324.
-
(2010)
Mobile Information Systems
, vol.6
, Issue.4
, pp. 293-324
-
-
Gaddah, A.1
Kunz, T.2
-
14
-
-
35449005874
-
Immune system approaches to intrusion detection - A review
-
DOI 10.1007/s11047-006-9026-4
-
J. Kim, P.J. Bentley, U. Aickelin, J. Greensmith, G. Tedesco and J. Twycross, Immune system approaches to intrusion detection-a review, Natural Computing 6(4) (2007), 413-466. (Pubitemid 47629391)
-
(2007)
Natural Computing
, vol.6
, Issue.4
, pp. 413-466
-
-
Kim, J.1
Bentley, P.J.2
Aickelin, U.3
Greensmith, J.4
Tedesco, G.5
Twycross, J.6
-
15
-
-
1642309744
-
Dynamic access control through petri net workflows
-
IEEE Computer Society
-
K. Knorr, Dynamic Access Control through Petri Net Workflows, In ACSAC, pages 159-167. IEEE Computer Society, 2000.
-
(2000)
ACSAC
, pp. 159-167
-
-
Knorr, K.1
-
16
-
-
80052143103
-
Lessons learned in using live red teams in ia experiments
-
IEEE Computer Society
-
D. Levin, Lessons learned in using live red teams in ia experiments, In DISCEX (1), pages 110-119. IEEE Computer Society, 2003.
-
(2003)
DISCEX
, vol.1
, pp. 110-119
-
-
Levin, D.1
-
17
-
-
80052636737
-
Using budget-based access control to manage operational risks caused by insiders
-
D. Liu, L.J. Camp, X. Wang and L. Wang, Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 1(1) (2010), 29-45.
-
(2010)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
, vol.1
, Issue.1
, pp. 29-45
-
-
Liu, D.1
Camp, L.J.2
Wang, X.3
Wang, L.4
-
19
-
-
0002975203
-
On the generalised distance in statistics
-
April
-
P.C. Mahalanobis, On the generalised distance in statistics, In Proceedings National Institute of Science, India, volume 2, pages 49-55, April 1936.
-
(1936)
Proceedings National Institute of Science, India
, vol.2
, pp. 49-55
-
-
Mahalanobis, P.C.1
-
21
-
-
80052614993
-
Immune multiagent system for network intrusion detection using non-linear classification algorithm
-
M.E. Mohamed, B.B. Samir and A. Abdullah, Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm, International Journal of Computer Applications 12(7) (2010), 7-12.
-
(2010)
International Journal of Computer Applications
, vol.12
, Issue.7
, pp. 7-12
-
-
Mohamed, M.E.1
Samir, B.B.2
Abdullah, A.3
-
23
-
-
33745929907
-
Audit-based access control in nomadic wireless environments
-
DOI 10.1007/11751595-57, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III
-
F. Palmieri and U. Fiore, Audit-Based Access Control in Nomadic Wireless Environments, in: ICCSA (3), volume 3982 of Lecture Notes in Computer Science,M.L. Gavrilova, O. Gervasi, V. Kumar, C.J.K. Tan, D. Taniar, A. Lagaǹa, Y. Mun and H. Choo, eds, Springer, 2006, pp. 537-545. (Pubitemid 44045229)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3982
, pp. 537-545
-
-
Palmieri, F.1
Fiore, U.2
-
24
-
-
80052622942
-
Automated detection and containment of worms and viruses into heterogeneous networks: A simple network immune system
-
May
-
F. Palmieri and U. Fiore, Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system, Int J Wire Mob Comput 2 (May 2007), 47-58.
-
(2007)
Int J Wire Mob Comput
, vol.2
, pp. 47-58
-
-
Palmieri, F.1
Fiore, U.2
-
25
-
-
77956393826
-
Network anomaly detection through nonlinear analysis
-
F. Palmieri and U. Fiore, Network anomaly detection through nonlinear analysis, Computers & Security 29(7) (2010), 737-755.
-
(2010)
Computers & Security
, vol.29
, Issue.7
, pp. 737-755
-
-
Palmieri, F.1
Fiore, U.2
-
27
-
-
77952908184
-
Routing of internal MANET traffic over external networks
-
V. Pham, E. Larsen, Ø. Kure and P. Engelstad, Routing of internal MANET traffic over external networks, Mobile Information Systems 5(3) (2009), 291-311.
-
(2009)
Mobile Information Systems
, vol.5
, Issue.3
, pp. 291-311
-
-
Pham, V.1
Larsen, E.2
Kure Ø3
Engelstad, P.4
-
30
-
-
29044443641
-
Decision making - The Analytic Hierarchy and Network Processes (AHP/ANP)
-
T.L. Saaty, Decision making-The Analytic Hierarchy and Network Processes (AHP/ANP), Journal of Systems Science and Systems Engineering 13 (2004), 1-35. 10.1007/s11518-006-0151-5. (Pubitemid 38615199)
-
(2004)
Journal of Systems Science and Systems Engineering
, vol.13
, Issue.1
, pp. 1-35
-
-
Saaty, T.L.1
-
31
-
-
77957172671
-
Fault reconnaissance agent for sensor networks
-
E. Shakshuki, X. Xing and T.R. Sheltami, Fault reconnaissance agent for sensor networks, Mobile Information Systems 6(3) (2010), 229-247.
-
(2010)
Mobile Information Systems
, vol.6
, Issue.3
, pp. 229-247
-
-
Shakshuki, E.1
Xing, X.2
Sheltami, T.R.3
-
32
-
-
78651283993
-
Network security situation prediction using artificial immune system and phase space reconstruction
-
Y.Q. Shi, T. Li,W. Chen and Y.M. Fu, Network Security Situation Prediction Using Artificial Immune System and Phase Space Reconstruction, Applied Mechanics and Materials 44-47 (2011), 3662-3666.
-
(2011)
Applied Mechanics and Materials
, vol.44-47
, pp. 3662-3666
-
-
Shi, Y.Q.1
Liw. Chen, T.2
Fu, Y.M.3
-
33
-
-
79959935163
-
Aggregate humanmobilitymodeling using principal component analysis
-
J. Sun, Y.Wang, H. Si, J. Yuan and X. Shan, Aggregate HumanMobilityModeling Using Principal Component Analysis, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 1(2/3) (2010), 83-95.
-
(2010)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
, vol.1
, Issue.2-3
, pp. 83-95
-
-
Sun, J.1
Wang, Y.2
Si, H.3
Yuan, J.4
Shan, X.5
-
34
-
-
12244283592
-
-
Technical report, National Institute of Standards and Technology (NIST) Special Publication
-
M. Swanson, N. Bartol, J. Sabato, J. Hash and L. Graffo, Security Metrics Guide for Information Technology Systems, Technical report, National Institute of Standards and Technology (NIST) Special Publication 800-55, 2007.
-
(2007)
Security Metrics Guide for Information Technology Systems
, pp. 800-855
-
-
Swanson, M.1
Bartol, N.2
Sabato, J.3
Hash, J.4
Graffo, L.5
-
35
-
-
0242456725
-
Dynamic and risk-aware network access management
-
ACM
-
L. Teo, G.-J. Ahn and Y. Zheng, Dynamic and risk-aware network access management. In SACMAT, pages 217-230. ACM, 2003.
-
(2003)
SACMAT
, pp. 217-230
-
-
Teo, L.1
Ahn, G.-J.2
Zheng, Y.3
-
36
-
-
84988603769
-
Towards a task-based paradigm for flexible and adaptable access control in distributed applications
-
New York, NY, USA ACM
-
R.K. Thomas and R.S. Sandhu, Towards a task-based paradigm for flexible and adaptable access control in distributed applications, In Proceedings on the 1992-1993 workshop on New security paradigms, NSPW '92-93, pages 138-142, New York, NY, USA, 1993. ACM.
-
(1993)
Proceedings on the 1992-1993 Workshop on New Security Paradigms, NSPW
, pp. 138-142
-
-
Thomas, R.K.1
Sandhu, R.S.2
|