-
2
-
-
33744936850
-
Autonomous Agent-Based Distributed Fault-Tolerant Intrusion Detection System
-
December 22-24, Bhubaneswar, India, LNCS No: 3186
-
J. Sen and I. Sengupta, "Autonomous Agent-Based Distributed Fault-Tolerant Intrusion Detection System", in Proceedings of the 2nd International Conference on Distributed Computing and Internet Technology (ICDCIT'05), December 22-24, 2005, Bhubaneswar, India, LNCS No: 3186, pp. 125-131.
-
(2005)
Proceedings of the 2nd International Conference on Distributed Computing and Internet Technology (ICDCIT'05)
, pp. 125-131
-
-
Sen, J.1
Sengupta, I.2
-
4
-
-
84990616603
-
Multiply Sectioned Bayesian Networks and Junction Forest for Large Knowledge-Based Systems
-
Y. Xiang, D. Poole, and M. Beddoes, "Multiply Sectioned Bayesian Networks and Junction Forest for Large Knowledge-Based Systems", Computational Intelligence, 9(2): 171-220, 1993.
-
(1993)
Computational Intelligence
, vol.9
, Issue.2
, pp. 171-220
-
-
Xiang, Y.1
Poole, D.2
Beddoes, M.3
-
5
-
-
0001006209
-
Local Computations with Probabilities on Graphical Structures and their Applications to Expert Systems
-
S.L. Lauritzen and D.J. Spiegelhalter, "Local Computations with Probabilities on Graphical Structures and their Applications to Expert Systems", in Proceedings of the Royal Statistical Society, Series B, 50, 1988, pp. 154-227.
-
(1988)
Proceedings of the Royal Statistical Society, Series B
, vol.50
, pp. 154-227
-
-
Lauritzen, S.L.1
Spiegelhalter, D.J.2
-
6
-
-
0002473030
-
DIDSDistributed Intrusion Detection System-Motivation, Architecture and an Early Prototype
-
October
-
S.R. Snapp, J. Brentano, and G.V. Dias, "DIDSDistributed Intrusion Detection System-Motivation, Architecture and an Early Prototype", in Proceedings of the 14th National Computer Security Conference, October 1991.
-
(1991)
Proceedings of the 14th National Computer Security Conference
-
-
Snapp, S.R.1
Brentano, J.2
Dias, G.V.3
-
8
-
-
84955580290
-
An Architecture for Intrusion Detection using Autonomous Agents
-
IEEE Computer Society, December
-
J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, E. Spafford, and D. Zamboni, "An Architecture for Intrusion Detection using Autonomous Agents", in Proceedings of the 14th Annual Computer Security Applications Conference, IEEE Computer Society, December 1998, pp. 13-24.
-
(1998)
Proceedings of the 14th Annual Computer Security Applications Conference
, pp. 13-24
-
-
Balasubramaniyan, J.S.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
9
-
-
0034300682
-
Intrusion Detection using Autonomous agents
-
October
-
E. Spafford and D. Zamboni, "Intrusion Detection using Autonomous agents", Computer Networks, 34 (4): 547-570, October 2000.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 547-570
-
-
Spafford, E.1
Zamboni, D.2
-
10
-
-
0035792373
-
Fuzzy Intrusion Detection
-
Vancouver, British Columbia, July
-
J. Dickerson, J. Juslin, O. Koukousoula, and J. Dickerson, "Fuzzy Intrusion Detection", in IFSA World Congress and 20th North American Fuzzy Information Processing Society (NAFIPS) International Conference, Vancouver, British Columbia, Vol. 3, July 2001, pp. 1506-1510.
-
(2001)
IFSA World Congress and 20th North American Fuzzy Information Processing Society (NAFIPS) International Conference
, vol.3
, pp. 1506-1510
-
-
Dickerson, J.1
Juslin, J.2
Koukousoula, O.3
Dickerson, J.4
-
11
-
-
0038048503
-
Integrating Intrusion Detection and Network Management
-
Florence, Italy, April
-
X. Qin, W. Lee, L. Lewis, and J. B. D. Cabrera, "Integrating Intrusion Detection and Network Management", in Proceedings of the 8th IEEE/IFIP Network Operations and Management Symposium (NMOS), Florence, Italy, April 2002, pp. 329-344.
-
(2002)
Proceedings of the 8th IEEE/IFIP Network Operations and Management Symposium (NMOS)
, pp. 329-344
-
-
Qin, X.1
Lee, W.2
Lewis, L.3
Cabrera, J.B.D.4
-
12
-
-
0001833836
-
A Framework for Cooperative Intrusion Detection
-
Arlington, VA, October
-
D. Frincke, D. Tobin, J. McConnell, J. Marconi, and D. Polla, "A Framework for Cooperative Intrusion Detection", in Proceedings of the 21st National Information Systems Security Conference, Arlington, VA, October 1998, pp. 361-373.
-
(1998)
Proceedings of the 21st National Information Systems Security Conference
, pp. 361-373
-
-
Frincke, D.1
Tobin, D.2
McConnell, J.3
Marconi, J.4
Polla, D.5
-
13
-
-
0034316644
-
Modeling Requests among Cooperating Intrusion Detection Systems
-
P. Ning, X. S. Wang, and S. Jajodia, "Modeling Requests among Cooperating Intrusion Detection Systems", Computer Communications, 23(17): 1702-1715, 2000.
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1702-1715
-
-
Ning, P.1
Wang, X.S.2
Jajodia, S.3
-
14
-
-
0008968386
-
A Query Facility for Common Intrusion Detection Framework
-
Baltimore, MD, October
-
P. Ning, X.S. Wang, and S. Jajodia, "A Query Facility for Common Intrusion Detection Framework", in Proceedings of the 23rd National Information Systems Security Conference, Baltimore, MD, October 2000, pp. 317-328.
-
(2000)
Proceedings of the 23rd National Information Systems Security Conference
, pp. 317-328
-
-
Ning, P.1
Wang, X.S.2
Jajodia, S.3
-
15
-
-
0342602262
-
-
URL. June
-
R. Feiertag, C. Kahn, P. Porras, D. Schnackenberg, S. Staniford-Chen, and B. Tung, "A Common Intrusion Specification Language (CISL)", URL: http://www.giods.org/drafts/language.txt. June 2000.
-
(2000)
A Common Intrusion Specification Language (CISL)
-
-
Feiertag, R.1
Kahn, C.2
Porras, P.3
Schnackenberg, D.4
Staniford-Chen, S.5
Tung, B.6
-
17
-
-
85015336184
-
Intelligent Agents for Intrusion Detection
-
Syracuse, NY, September
-
G. Helmer, J.S.K. Wong, V. Honavar, and L. Miller, "Intelligent Agents for Intrusion Detection", in Proceedings of IEEE Information Technology Conference, Syracuse, NY, September 1998, pp. 121-124.
-
(1998)
Proceedings of IEEE Information Technology Conference
, pp. 121-124
-
-
Helmer, G.1
Wong, J.S.K.2
Honavar, V.3
Miller, L.4
-
18
-
-
85066156928
-
CARDS: A Distributed System for Detecting Coordinated attacks
-
August
-
J. Yang, P. Ning, X.S. Wang, and S. Jajodia, "CARDS: A Distributed System for Detecting Coordinated attacks", in Proceedings of IFIP TCII 16th Annual Working Conference on Information Security, August 2000, pp. 171-180.
-
(2000)
Proceedings of IFIP TCII 16th Annual Working Conference on Information Security
, pp. 171-180
-
-
Yang, J.1
Ning, P.2
Wang, X.S.3
Jajodia, S.4
-
19
-
-
34248364348
-
Hybrid Intelligent Systems for Network Security
-
March 10-12, Melbourne, Florida
-
J.L. Thames, R. Abler, and A. Saad, "Hybrid Intelligent Systems for Network Security", in Proceedings of the 44th ACM Annual Southeast Regional Conference, March 10-12, 2006, Melbourne, Florida, pp. 286-289.
-
(2006)
Proceedings of the 44th ACM Annual Southeast Regional Conference
, pp. 286-289
-
-
Thames, J.L.1
Abler, R.2
Saad, A.3
-
20
-
-
34748870795
-
A Framework for an Adaptive Intrusion Detection System using Bayesian Network
-
May 23-24
-
F. Jemili, M. Zaghdoud, and M.B. Ahmed, "A Framework for an Adaptive Intrusion Detection System using Bayesian Network", in Proceedings of IEEE International Conference on Intelligence and Security Informatics, May 23-24, 2007, pp. 66-70.
-
(2007)
Proceedings of IEEE International Conference on Intelligence and Security Informatics
, pp. 66-70
-
-
Jemili, F.1
Zaghdoud, M.2
Ahmed, M.B.3
-
21
-
-
38849133535
-
A Remote IDS Based on Multi-Agent Systems, Web Services and MDA
-
M. Silva, D. Lopes, and Z. Abdelouahab, "A Remote IDS Based on Multi-Agent Systems, Web Services and MDA", in Proceedings of the International Conference on Software Engineering Advances (ICSEA), 2009, pp. 64.
-
(2009)
Proceedings of the International Conference on Software Engineering Advances (ICSEA)
, pp. 64
-
-
Silva, M.1
Lopes, D.2
Abdelouahab, Z.3
-
22
-
-
80053558901
-
-
Master Thesis, School of Computer Science and Software Engineering, University of Wollongong, Australia
-
D. Ye, "An Agent-Based Framework for Distributed Intrusion Detections", Master Thesis, School of Computer Science and Software Engineering, University of Wollongong, Australia, 2009.
-
(2009)
An Agent-Based Framework for Distributed Intrusion Detections
-
-
Ye, D.1
-
23
-
-
80053488280
-
A Data-Fusion-Based Method for Intrusion Detection System in Networks
-
October
-
X. Zhao, H. Jiang, and L. Jiao, "A Data-Fusion-Based Method for Intrusion Detection System in Networks", International Journal of Information Engineering and Electronic Business, Vol 1, pp, 33-41, October 2009.
-
(2009)
International Journal of Information Engineering and Electronic Business
, vol.1
, pp. 33-41
-
-
Zhao, X.1
Jiang, H.2
Jiao, L.3
-
24
-
-
80053549000
-
Agent-Based Intrusion Detection for Network-Based Application
-
May
-
J. Zeng and D. Guo, "Agent-Based Intrusion Detection for Network-Based Application", International Journal of Network Security, Vol. 8, No. 3, pp. 201-210, May 2009.
-
(2009)
International Journal of Network Security
, vol.8
, Issue.3
, pp. 201-210
-
-
Zeng, J.1
Guo, D.2
-
25
-
-
4444235644
-
KQML Realization Algorithms for Agent Communication
-
Y. Liu, C.F. Xu, W.D. Chen, and Y.H. Pan, "KQML Realization Algorithms for Agent Communication", in Proceedings of the 5th World Congress on Intelligent Control and Automation, 2004, pp. 2376-2379.
-
(2004)
Proceedings of the 5th World Congress on Intelligent Control and Automation
, pp. 2376-2379
-
-
Liu, Y.1
Xu, C.F.2
Chen, W.D.3
Pan, Y.H.4
-
27
-
-
80053528156
-
Intelligent IDS for Mobile Devices: Modeling and Prototyping
-
December
-
A.L. Da Silva, Z. Abdelouahab, and D. Lopes, "Intelligent IDS for Mobile Devices: Modeling and Prototyping", International Journal of Communication Networks and Information Security (IJCNIS), Vol 1, No 3, December 2009, pp. 12-23.
-
(2009)
International Journal of Communication Networks and Information Security (IJCNIS)
, vol.1
, Issue.3
, pp. 12-23
-
-
Da Silva, A.L.1
Abdelouahab, Z.2
Lopes, D.3
-
28
-
-
80053485623
-
A Traffic Signature-Based Algorithm for Detecting Scanning Internet Worms
-
December
-
M.M. Rasheed, O. Ghazali, N.M. Norwawi, and M.M. Kadhum, "A Traffic Signature-Based Algorithm for Detecting Scanning Internet Worms", International Journal of Communication Networks and Information Security (IJCNIS), Vol 1, No 3, December 2009, pp. 24-30.
-
(2009)
International Journal of Communication Networks and Information Security (IJCNIS)
, vol.1
, Issue.3
, pp. 24-30
-
-
Rasheed, M.M.1
Ghazali, O.2
Norwawi, N.M.3
Kadhum, M.M.4
-
29
-
-
78650747396
-
An Approach against a Computer Worm Attack
-
O. Toutonji and S-M. Yoo, "An Approach against a Computer Worm Attack", International Journal of Communication Networks and Information Security (IJCNIS), Vol 1, No 2, August 2009, pp. 47-53.
-
(2009)
International Journal of Communication Networks and Information Security (IJCNIS)
, vol.1
, Issue.2
, pp. 47-53
-
-
Toutonji, O.1
Yoo, S.-M.2
-
32
-
-
0030284198
-
A Probabilistic Framework for Cooperative Multiagent Distributed Interpretation and Optimization of Communication
-
Y. Xiang. "A Probabilistic Framework for Cooperative Multiagent Distributed Interpretation and Optimization of Communication", Artificial Intelligence, 87 (1-2); 295-342, 1996.
-
(1996)
Artificial Intelligence
, vol.87
, Issue.1-2
, pp. 295-342
-
-
Xiang, Y.1
-
33
-
-
0038729631
-
Comparison of Multiagent Inference Methods in Multiply Sectioned Bayesian Networks
-
August
-
Y. Xiang. "Comparison of Multiagent Inference Methods in Multiply Sectioned Bayesian Networks", International Journal of Approximate Reasoning, 33(3): 235-254, August 2003.
-
(2003)
International Journal of Approximate Reasoning
, vol.33
, Issue.3
, pp. 235-254
-
-
Xiang, Y.1
-
35
-
-
0019393995
-
Functionally Accurate Cooperative Distributed Systems
-
V.R. Lesser and D.D. Corkill, "Functionally Accurate Cooperative Distributed Systems", IEEE Trans. On Systems, Man and Cybernetics, SMC-11(1): 81-96, 1981.
-
(1981)
IEEE Trans. On Systems, Man and Cybernetics, SMC
, vol.11
, Issue.1
, pp. 81-96
-
-
Lesser, V.R.1
Corkill, D.D.2
-
38
-
-
0442296744
-
A Bayesian Paradigm for Designing Intrusion Detection System
-
February
-
S.L. Scott, "A Bayesian Paradigm for Designing Intrusion Detection System", Computational Statistics and Data Analysis, 45(1): 69-83, February 2004.
-
(2004)
Computational Statistics and Data Analysis
, vol.45
, Issue.1
, pp. 69-83
-
-
Scott, S.L.1
-
40
-
-
84903437824
-
-
URL
-
FIPA-OS Developers Guide. URL: http://fipaos.sourceforge.net/docs/Developers_Guide.pdf.
-
FIPA-OS Developers Guide
-
-
-
42
-
-
0001698979
-
Bayesian Updating in Causal Probabilistic Networks by Local Computations
-
F. V. Jensen, S.L Lauritzen, and K. G. Oleson, "Bayesian Updating in Causal Probabilistic Networks by Local Computations." Computational Statistics Quarterly, 4:269-282, 1990.
-
(1990)
Computational Statistics Quarterly
, vol.4
, pp. 269-282
-
-
Jensen, F.V.1
Lauritzen, S.L.2
Oleson, K.G.3
-
44
-
-
0033916466
-
Belief Updating in Multiply Sectioned Bayesian Networks without Repeated Local Propagation
-
Y. Xiang, "Belief Updating in Multiply Sectioned Bayesian Networks without Repeated Local Propagation", International Journal of Approximate Reasoning 23:1-21, 2000.
-
(2000)
International Journal of Approximate Reasoning
, vol.23
, pp. 1-21
-
-
Xiang, Y.1
-
45
-
-
0025401005
-
The Computational Complexity of Probabilistic Inference using Bayesian Belief Networks
-
G.F. Cooper, "The Computational Complexity of Probabilistic Inference using Bayesian Belief Networks", Artificial Intelligence, 42: 393-405, 1990.
-
(1990)
Artificial Intelligence
, vol.42
, pp. 393-405
-
-
Cooper, G.F.1
-
46
-
-
0028483915
-
Finding Maps for Belief Networks is NPHard
-
S. Shimony, "Finding Maps for Belief Networks is NPHard", Artificial Intelligence, 68: 399-410, 1994.
-
(1994)
Artificial Intelligence
, vol.68
, pp. 399-410
-
-
Shimony, S.1
-
47
-
-
84976699318
-
The Byzantine Generals Problem
-
July
-
L. Lamport, R. Shostak, and M. Pease, "The Byzantine Generals Problem", ACM Transactions on Programming Languages and System, 4(3): 382-401, July 1982.
-
(1982)
ACM Transactions on Programming Languages and System
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
48
-
-
36348976957
-
-
Masters Dissertation in Computer Science, Worcester Polytechnic Institute, December
-
D.M. Toth, The Byzantine Agreement Protocol Applied to Security, Masters Dissertation in Computer Science, Worcester Polytechnic Institute, December 2004.
-
(2004)
The Byzantine Agreement Protocol Applied to Security
-
-
Toth, D.M.1
-
49
-
-
84888391834
-
-
URL. DARPA Intrusion Data Repository
-
Kddcup 99 Intrusion Detection Data Set. URL: http://kdd.ics.uci.edu/databases/kddcup99/kddcup.data_10_percent.gz. DARPA Intrusion Data Repository.
-
(2012)
Kddcup 99 Intrusion Detection Data Set
-
-
-
50
-
-
80053532199
-
-
URL. DARPA Intrusion Data Repository
-
MIT Lincoln Laboratory. URL: http://www.ll.mit.edu/IST/ideval/. DARPA Intrusion Data Repository.
-
(2012)
MIT Lincoln Laboratory
-
-
-
51
-
-
0038738492
-
-
Technical Report, University of Alberta, Canada
-
J. Cheng, D. Bell, and W. Liu, Learning Bayesian Networks from Data: An efficient Approach based on Information Theory, Technical Report, University of Alberta, Canada, 1998.
-
(1998)
Learning Bayesian Networks from Data: An efficient Approach based on Information Theory
-
-
Cheng, J.1
Bell, D.2
Liu, W.3
-
53
-
-
79551573973
-
A Novel Distributed Intrusion Detection Model Based on Immune Mobile Agent
-
Nanchang, China, May
-
Y. Li, R. Wang, and J. Xu, "A Novel Distributed Intrusion Detection Model Based on Immune Mobile Agent", in Proceedings of the International Symposium on Web Information Systems and Applications (WISA), pp. 72-75, Nanchang, China, May 2009.
-
(2009)
Proceedings of the International Symposium on Web Information Systems and Applications (WISA)
, pp. 72-75
-
-
Li, Y.1
Wang, R.2
Xu, J.3
|