-
1
-
-
0004048154
-
-
Anderson co, Box 42, Fort Washington, February
-
ANDERSON J.P., Computer security threat monitoring and surveillance, Technical report, James P. Anderson co, Box 42, Fort Washington, February 1980
-
(1980)
Computer security threat monitoring and surveillance, Technical report, James P
-
-
Anderson, J.P.1
-
2
-
-
0007667777
-
-
INET'99, June
-
ASAKA, M., OKAZAWA, S., TAGUCHI, A. AND GOTO, S., A method for tracing intruders by use of mobile agents, INET'99, June 1999
-
(1999)
A method for tracing intruders by use of mobile agents
-
-
Asaka, M.1
Okazawa, S.2
Taguchi, A.3
Goto, S.4
-
3
-
-
84955580290
-
An architecture for intrusion detection using autonomous agents
-
BALASUBRAMANIYA, J., GARCIA-FERNANDEZ, J.O., ISACOFF, D., SPAFFORD, E.H. AND ZAMBONI, D., An architecture for intrusion detection using autonomous agents, Department of Computer Science, Purdue University, Coast TR 98-05, (1998), http://www.cs.purdue.edu/coas/coast-library.html
-
(1998)
Department of Computer Science, Purdue University, Coast TR 98-05
-
-
Balasubramaniya, J.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.H.4
Zamboni, D.5
-
4
-
-
0004175734
-
-
BOX, D., EHNEBUSKE, D., KAKIVAYA, G., LAYMAN, A., MENDELSOHN, N., NIELSEN, F., THATTE, S., AND WINER, D., Simple Object Access Protocol (SOAP) 1.2, (2000), http://www.w3.org/TR/2000/NOTE-SOAP-20000508/
-
(2000)
Simple Object Access Protocol (SOAP) 1.2
-
-
Box, D.1
Ehnebuske, D.2
Kakivaya, G.3
Layman, A.4
Mendelsohn, N.5
Nielsen, F.6
Thatte, S.7
Winer, D.8
-
5
-
-
85040686798
-
-
In Jeffrey M. Bradshaw, Editor, Software agents, Chapter 1, AAAI press, The MIT press
-
BRADSHAW, M.J., An introduction to Software agents, In Jeffrey M. Bradshaw, Editor, Software agents, Chapter 1, AAAI press, The MIT press, (1997)
-
(1997)
An introduction to Software agents
-
-
Bradshaw, M.J.1
-
6
-
-
33646521321
-
-
DEETER, K., SINGH, K., WILLSON, S., FILIPOZZI, L., AND VUONG, S., APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection, (2004), http://www.cc.gatech.edu/grads/k/ksingh/publication/aphids_cameraready.pdf
-
(2004)
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection
-
-
Deeter, K.1
Singh, K.2
Willson, S.3
Filipozzi, L.4
Vuong, S.5
-
7
-
-
80054070840
-
Micael: An autonomous mobile agent system to protect newgeneration networked applications
-
September
-
DE QUERIOZ, J.D., DA COSTA CARMO, L.F.R. AND PIRMEZ, L., Micael: An autonomous mobile agent system to protect newgeneration networked applications, In 2nd annual workshop on Recent Advances in Intrusion Detection, September 1999
-
(1999)
In 2nd annual workshop on Recent Advances in Intrusion Detection
-
-
Querioz, D.J.D.1
Carmo, D.C.L.F.R.2
Pirmez, L.3
-
8
-
-
0038729639
-
Lightweight agents for intrusion detection
-
HELMER, G., WONG J.S.K., HONAVAR V., MILLER L. AND WANG, Y., Lightweight agents for intrusion detection, Journal of Systems and Software, (2003), www.elsevier.com/locate/jss
-
(2003)
Journal of Systems and Software
-
-
Helmer, G.1
Wong, J.S.K.2
Honavar, V.3
Miller, L.4
Wang, Y.5
-
9
-
-
0011066222
-
-
NIST Interim Report (IR)-6416
-
JANSEN W., MELL, P., KARYGIANNIS, T. AND MARKS, D., Applying Mobile Agent to Intrusion Detection and Response, NIST Interim Report (IR)-6416, (1999)
-
(1999)
Applying Mobile Agent to Intrusion Detection and Response
-
-
Jansen, W.1
Mell, P.2
Karygiannis, T.3
Marks, D.4
-
11
-
-
30144443621
-
-
Technical ReportNumber TUV-1841-2002-24, Technical University of Vienna
-
KRUEGEL, C., TOTH, T. AND KIRDA, E., Sparta-A Mobile Agent-based Intrusion Detection System, Technical ReportNumber TUV-1841-2002-24, Technical University of Vienna, (2002)
-
(2002)
Sparta-A Mobile Agent-based Intrusion Detection System
-
-
Kruegel, C.1
Toth, T.2
Kirda, E.3
-
13
-
-
1642363231
-
AND AKINWALE A.T., A New Two-tiered Strategy to Intrusion Detection
-
SODIYA, A.S., LONGE H.O.D. AND AKINWALE A.T., A New Two-tiered Strategy to Intrusion Detection, Emerald Journal of Information Management and Computer Security, Vol. 12, No. 1, (2004)
-
(2004)
Emerald Journal of Information Management and Computer Security
, vol.12
, Issue.1
-
-
Sodiya, A.S.1
Longe, H.O.D.2
-
14
-
-
24144444549
-
An Improved Two-tiered Strategy to IntrusionDetection
-
SODIYA, A.S. AND LONGE H.O.D., An Improved Two-tiered Strategy to IntrusionDetection, Emerald Journal of Information Management and Computer Security, Vol. 13, No. 1, (2005)
-
(2005)
Emerald Journal of Information Management and Computer Security
, vol.13
, Issue.1
-
-
Sodiya, A.S.1
Longe, H.O.D.2
-
15
-
-
85172423269
-
Javaagents for meta-learning over distributed databases
-
Newport Beach, CA, USA, August
-
STOLFO, S.J., PRODROMIDIS, A.L., TSELEPIS, S., LEE, W., FAN, D., AND CHAN, P.K., JAM: Javaagents for meta-learning over distributed databases, In Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, Newport Beach, CA, USA, August 1997
-
(1997)
In Proceedings of the Third International Conference on Knowledge Discovery and Data Mining
-
-
Stolfo, S.J.1
Prodromidis, A.L.2
Tselepis, S.3
Lee, W.4
Fan, D.5
Chan, A.6
Jam, P.K.7
-
16
-
-
31044448292
-
Towards the Automatic Generation of Mobile Agents for Distributed Intrusion Detection System
-
WANG, W., BEHERA, S. R., WONG, J., HELMER, G., HONAVAR, V., MILLER, L., LUTZ, R., AND SLAGEL, M., Towards the Automatic Generation of Mobile Agents for Distributed Intrusion Detection System, Journal of Systems and Software, 79 (2006), pp. 1-14, www.elsevier.com/locate/jss
-
(2006)
Journal of Systems and Software
, vol.79
, pp. 1-14
-
-
Wang, W.1
Behera, S.R.2
Wong, J.3
Helmer, G.4
Honavar, V.5
Miller, L.6
Lutz, R.7
Slagel, M.8
|