-
1
-
-
60949103436
-
Delay constrained up-link scheduling policy for rtPS/ertPS Service in IEEE 802.16e BWA Systems
-
Deng DJ, Chang LW, Ke CH, Huang YM, Chang JM,. Delay constrained up-link scheduling policy for rtPS/ertPS Service in IEEE 802.16e BWA Systems. International Journal of Communication Systems 2009; 22 2: 119-133.
-
(2009)
International Journal of Communication Systems
, vol.22
, Issue.2
, pp. 119-133
-
-
Deng, D.J.1
Chang, L.W.2
Ke, C.H.3
Huang, Y.M.4
Chang, J.M.5
-
2
-
-
50249148284
-
Localized and load-balanced clustering for energy saving in wireless sensor networks
-
Su BL, Wang MS, Huang YM,. Localized and load-balanced clustering for energy saving in wireless sensor networks. International Journal of Communication Systems 2008; 21 8: 799-814.
-
(2008)
International Journal of Communication Systems
, vol.21
, Issue.8
, pp. 799-814
-
-
Su, B.L.1
Wang, M.S.2
Huang, Y.M.3
-
3
-
-
67349219359
-
Pervasive, Secure Access to a Hierarchical-based Healthcare Monitoring Architecture in Wireless Heterogeneous Sensor Networks
-
Huang YM, Hsieh MY, Chao HC, Hung SH, Park JH,. Pervasive, Secure Access to a Hierarchical-based Healthcare Monitoring Architecture in Wireless Heterogeneous Sensor Networks. IEEE Journal on Selected Areas in Communications 2009; 27 4: 400-411.
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.4
, pp. 400-411
-
-
Huang, Y.M.1
Hsieh, M.Y.2
Chao, H.C.3
Hung, S.H.4
Park, J.H.5
-
4
-
-
84858613793
-
-
Firewall (computing). [Apr. 2008]
-
Wikipedia. Firewall (computing). Available from: [Apr. 2008].
-
Wikipedia
-
-
-
5
-
-
84870638842
-
-
The FreeBSD Documentation Project [June 2009]
-
The FreeBSD Documentation Project. FreeBSD Handbook. Available from: [June 2009].
-
FreeBSD Handbook
-
-
-
8
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
May
-
Lazarevic A, Ertoz L, Kumar V, Ozgur A, Srivastava J,. A comparative study of anomaly detection schemes in network intrusion detection, Proceedings of Third SIAM Conference on Data Mining, May 2003.
-
(2003)
Proceedings of Third SIAM Conference on Data Mining
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
10
-
-
27644509266
-
Intrusion detection systems and intrusion prevention systems
-
DOI 10.1016/j.istr.2005.08.001, PII S1363412705000415
-
Fuchsberger A,. Intrusion detection systems and intrusion prevention systems. Information Security Technical Report 2005; 10 3: 134-139. (Pubitemid 41550372)
-
(2005)
Information Security Technical Report
, vol.10
, Issue.3
, pp. 134-139
-
-
Fuchsberger, A.1
-
12
-
-
78049324449
-
Correlation analysis of intrusion alerts
-
In, Pietro R. Mancini L. (eds), Springer, Berlin, (;. ISBN 978-0-387-77265-3
-
Xu D, Ning P,. Correlation analysis of intrusion alerts, In Intrusion Detection Systems, (Vol. 38 of Advances in Information Security), Pietro R, Mancini L, (eds), Springer, Berlin, (2008; 65-92. ISBN 978-0-387-77265-3
-
(2008)
Intrusion Detection Systems, (Vol. 38 of Advances in Information Security)
, pp. 65-92
-
-
Xu, D.1
Ning, P.2
-
13
-
-
84860670029
-
Toward automated intrusion alert analysis
-
In, Huang S. Du D. MacCallum D. (eds), Springer, Berlin, ISBN 978-0-387-73820-8
-
Ning P, Xu D,. Toward automated intrusion alert analysis, In Network Security, Huang S, Du D, MacCallum D, (eds), Springer, Berlin, 2010. ISBN 978-0-387-73820-8
-
(2010)
Network Security
-
-
Ning, P.1
Xu, D.2
-
14
-
-
63249101412
-
An ontology-based approach to react to network attacks
-
Tozer, Tunisia, October
-
Cuppens-Boulahia N, Cuppens F, Vergara JEL, Vazquez E, Guerra J, Debar H,. An ontology-based approach to react to network attacks, Third International Conference on Risk and Security of Internet and Systems, Tozer, Tunisia, October 2008.
-
(2008)
Third International Conference on Risk and Security of Internet and Systems
-
-
Cuppens-Boulahia, N.1
Cuppens, F.2
Vergara, J.E.L.3
Vazquez, E.4
Guerra, J.5
Debar, H.6
-
15
-
-
67349242974
-
A logic-based model to support alert correlation in intrusion detection
-
Morin B, Mé L, Debar H, Ducassé M,. A logic-based model to support alert correlation in intrusion detection. Information Fusion 2009; 10 4: 285-299.
-
(2009)
Information Fusion
, vol.10
, Issue.4
, pp. 285-299
-
-
Morin, B.1
Mé, L.2
Debar, H.3
Ducassé, M.4
-
16
-
-
67349164787
-
Processing intrusion detection alert aggregates with time series modeling
-
Viinikka J, Debar H, Me L, Lehikoinen A, Tarvainen M,. Processing intrusion detection alert aggregates with time series modeling. Information Fusion 2009; 10 4: 312-324.
-
(2009)
Information Fusion
, vol.10
, Issue.4
, pp. 312-324
-
-
Viinikka, J.1
Debar, H.2
Me, L.3
Lehikoinen, A.4
Tarvainen, M.5
-
17
-
-
50049118707
-
A flexible approach to intrusion alert anonymization and correlation
-
28 August-1 September
-
Xu D, Ning P,. A flexible approach to intrusion alert anonymization and correlation, Securecomm and Workshops,28 August-1 September 2006; 1-10.
-
(2006)
Securecomm and Workshops
, pp. 1-10
-
-
Xu, D.1
Ning, P.2
-
18
-
-
79958186026
-
Building attack scenarios through integration of complementary alert correlation methods
-
In, Internet Society, Reston, VA.
-
Ning P, Xu D, Healey C, Amant RS,. Building attack scenarios through integration of complementary alert correlation methods, In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS 2004), Internet Society, Reston, VA, 2004; 97-111.
-
(2004)
Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS 2004)
, pp. 97-111
-
-
Ning, P.1
Xu, D.2
Healey, C.3
Amant, R.S.4
-
19
-
-
33750993204
-
The use of distributed network-based IDS systems in detection of evasion attacks
-
DOI 10.1109/AICT.2005.90, 1517609, Proceedings - Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop AICT/SAPIR/ELETE 2005
-
Basicevic F, Popovic M, Kovacevic V,. The use of distributed network-based IDS systems in detection of evasion attacks, Advance Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-learning on Telecommunications Workshop,17-20 July 2005; 78-82. (Pubitemid 44739797)
-
(2005)
Proceedings - Advanced Industrial Conference on Telecommunications/ Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop AICT/SAPIR/ELETE 2005
, vol.2005
, pp. 78-82
-
-
Basicevic, I.1
Popovic, M.2
Kovacevic, V.3
-
20
-
-
33845524232
-
Network intrusion detection: Automated and manual methods prone to attack and evasion
-
Chaboya D, Raines R, Baldwin R, Mullins B,. Network intrusion detection: automated and manual methods prone to attack and evasion. Journal of IEEE Security & Privacy 2006; 8 6: 36-43. (Pubitemid 44925870)
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.6
, pp. 36-43
-
-
Chaboya, D.J.1
Raines, R.A.2
Baldwin, R.O.3
Mullins, B.E.4
-
22
-
-
68249135445
-
Enhanced high performance distributed coordination function for IEEE 802.11 multi-rate LANs
-
Ke CH, Li B, Huang YM, Chang JM,. Enhanced high performance distributed coordination function for IEEE 802.11 multi-rate LANs. International Journal of Communication Systems 2008; 22 8: 1045-1061.
-
(2008)
International Journal of Communication Systems
, vol.22
, Issue.8
, pp. 1045-1061
-
-
Ke, C.H.1
Li, B.2
Huang, Y.M.3
Chang, J.M.4
-
23
-
-
69449105409
-
Secure communications and data management in ubiquitous services
-
Hsu CH, Park JH, Yang LT, Freire M,. Secure communications and data management in ubiquitous services. International Journal of Communication Systems 2009; 22 9: 1065-1068.
-
(2009)
International Journal of Communication Systems
, vol.22
, Issue.9
, pp. 1065-1068
-
-
Hsu, C.H.1
Park, J.H.2
Yang, L.T.3
Freire, M.4
-
24
-
-
84860652783
-
-
The FreeBSD Foundation [Sep. 2008]
-
The FreeBSD Foundation. FreeBSD The Power to Serve. Available from: [Sep. 2008].
-
FreeBSD the Power to Serve
-
-
-
26
-
-
51649104949
-
Anatomy of a real-time intrusion prevention system
-
2-6 June
-
Koller R, Rangaswami R, Marrero J, Hern J, Smith G, Barsilai Y, Necula S, Sadjadi SM, Li T, Merrill K,. Anatomy of a real-time intrusion prevention system,International Conference on Autonomic Computing; 151-160. 2-6 June 2008.
-
(2008)
International Conference on Autonomic Computing
, pp. 151-160
-
-
Koller, R.1
Rangaswami, R.2
Marrero, J.3
Hern, J.4
Smith, G.5
Barsilai, Y.6
Necula, S.7
Sadjadi, S.M.8
Li, T.9
Merrill, K.10
-
27
-
-
8344261545
-
Packetscore: Statistics-based overload control against distributed denial-of-service attacks
-
Kim Y, Lau WC, Chuah MC, Chao HJ,. Packetscore: statistics-based overload control against distributed denial-of-service attacks. INFOCOM 2004; 4: 2594-2604.
-
(2004)
INFOCOM
, vol.4
, pp. 2594-2604
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
28
-
-
74049157937
-
-
MIT Lincoln Laboratory [Sep. 2008]
-
MIT Lincoln Laboratory. Information Systems Technology. Available from: [Sep. 2008].
-
Information Systems Technology
-
-
-
29
-
-
48649097500
-
A Practice of the Intrusion Prevention System
-
30 October-2 November
-
Wuu LC, Chen YH, Ma CC, Lung IT,. A Practice of the Intrusion Prevention System, TENCON-2007 IEEE Region 10 Conference,30 October-2 November 2007; 1-4.
-
(2007)
TENCON - 2007 IEEE Region 10 Conference
, pp. 1-4
-
-
Wuu, L.C.1
Chen, Y.H.2
Ma, C.C.3
Lung, I.T.4
-
30
-
-
77955377238
-
-
The Wireshark team [Jan. 2009]
-
The Wireshark team. Wireshark User's Guide. Available from: http://www.wireshark.org/docs/[Jan. 2009].
-
Wireshark User's Guide
-
-
-
31
-
-
84860652251
-
-
[Jan. 2009]
-
Gordon Lyon,. Nmap. Available from: http://nmap.org/docs.html[Jan. 2009].
-
-
-
Gordon, L.1
-
32
-
-
84860652250
-
-
XFOCUS Team tfn2k.gz [Dec. 2008]
-
XFOCUS Team. tfn2k.gz. Available from: http://www.xfocus.net/tools/ 200405/697.html[Dec. 2008].
-
-
-
-
33
-
-
84860652252
-
-
Mixter [Dec. 2008]
-
Mixter. tfn2k use and countermeasures. Available from: http://fanqiang.chinaunix.net/a5/b6/20010419/130342-b.html[Dec. 2008].
-
Tfn2k Use and Countermeasures
-
-
-
34
-
-
84860694878
-
-
Mixter [Dec. 2008]
-
Mixter. Tribe Flood Network. Available from: http://en.wikipedia.org/ wiki/tribe-flood-network[Dec. 2008].
-
Tribe Flood Network
-
-
-
35
-
-
43249105264
-
An assessment of the DARPA IDS Evaluation Dataset Using Snort
-
University of California Davis, Davis, CA, (6 January)
-
Brugger ST, Chow J,. An assessment of the DARPA IDS Evaluation Dataset Using Snort, Technical Report CSE-2007-1, University of California Davis, Davis, CA, (6 January 2007).
-
(2007)
Technical Report CSE-2007-1
-
-
Brugger, S.T.1
Chow, J.2
-
36
-
-
34547326623
-
An evaluation technique for network intrusion detection systems
-
In, ACM, New York, NY.
-
Zhang D, Leckie C,. An evaluation technique for network intrusion detection systems, In Proceedings of the 1st International Conference on Scalable Information Systems (Vol. 152 of ACM International Conference Proceeding Series of Infoscale), ACM, New York, NY, 2006; 23-33.
-
(2006)
Proceedings of the 1st International Conference on Scalable Information Systems (Vol. 152 of ACM International Conference Proceeding Series of Infoscale)
, pp. 23-33
-
-
Zhang, D.1
Leckie, C.2
-
38
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Hilton Head, SC, 25-27 January
-
Lippmann RP, Fried DJ, Graf I, Haines JW, Kendall JR, McClung D, Weber D, Webster SE, Wyschogrod D, Cunningham RK, Zissman MA,. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, Proceedings on DARPA Information Survivability Conference and Exposition, Hilton Head, SC, 25-27 January 2000; 12-26.
-
(2000)
Proceedings on DARPA Information Survivability Conference and Exposition
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, J.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
|