-
3
-
-
84944201343
-
LAMBDA: A Language to Model a Database for Detection of Attacks
-
Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. Springer, Heidelberg
-
Cuppens, F., Ortalo, R.: LAMBDA: A Language to Model a Database for Detection of Attacks. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 197-216. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1907
, pp. 197-216
-
-
Cuppens, F.1
Ortalo, R.2
-
4
-
-
84865502282
-
Peer-to-peer Based Intrusion Detection
-
Czirkos, Z., Hosszú, G.: Peer-to-peer Based Intrusion Detection. Infocommunications Journal LXIV(I), 3-10 (2009)
-
(2009)
Infocommunications Journal
, vol.64
, Issue.1
, pp. 3-10
-
-
Czirkos, Z.1
Hosszú, G.2
-
5
-
-
84865505425
-
Novel Applications of the Peer-to-Peer Communication Methodology
-
Czirkos, Z., Tóth, L.L., Hosszú, G., Kovács, F.: Novel Applications of the Peer-to-Peer Communication Methodology. Journal on Information Technologies and Communications E-1(1(5)), 59-70 (2009)
-
(2009)
Journal on Information Technologies and Communications
, vol.E-1
, Issue.1-5
, pp. 59-70
-
-
Czirkos, Z.1
Tóth, L.L.2
Hosszú, G.3
Kovács, F.4
-
6
-
-
84947561772
-
Aggregation and Correlation of Intrusion-Detection Alerts
-
Lee, W., Mé, L., Wespi, A. (eds.) RAID 2001. Springer, Heidelberg
-
Debar, H., Wespi, A.: Aggregation and Correlation of Intrusion-Detection Alerts. In: Lee, W., Mé, L., Wespi, A. (eds.) RAID 2001. LNCS, vol. 2212, pp. 85-103. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2212
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
7
-
-
70349687064
-
Rule-based anomaly detection on ip flows
-
IEEE
-
Duffield, N., Haffner, P., Krishnamurthy, B., Ringberg, H.: Rule-based anomaly detection on ip flows. In: IEEE INFOCOM 2009, pp. 424-432. IEEE (2009)
-
(2009)
IEEE INFOCOM 2009
, pp. 424-432
-
-
Duffield, N.1
Haffner, P.2
Krishnamurthy, B.3
Ringberg, H.4
-
8
-
-
84942121141
-
Indra: A Peer-to-peer Approach to Network Intrusion Detection and Prevention
-
IEEE
-
Janakiraman, R., Waldvogel, M., Zhang, Q.: Indra: A Peer-to-peer Approach to Network Intrusion Detection and Prevention. In: Proceedings of Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2003, pp. 226-231. IEEE (2003)
-
(2003)
Proceedings of Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2003
, pp. 226-231
-
-
Janakiraman, R.1
Waldvogel, M.2
Zhang, Q.3
-
9
-
-
0030704545
-
Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web
-
ACM, New York
-
Karger, D., Lehman, E., Leighton, T., Panigrahy, R., Levine, M., Lewin, D.: Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web. In: Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, STOC 1997, pp. 654-663. ACM, New York (1997)
-
(1997)
Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, STOC 1997
, pp. 654-663
-
-
Karger, D.1
Lehman, E.2
Leighton, T.3
Panigrahy, R.4
Levine, M.5
Lewin, D.6
-
11
-
-
0037002475
-
Intrusion detection: A brief history and overview
-
Kemmerer, R., Vigna, G.: Intrusion detection: a brief history and overview. Computer 35(4), 27-30 (2002)
-
(2002)
Computer
, vol.35
, Issue.4
, pp. 27-30
-
-
Kemmerer, R.1
Vigna, G.2
-
12
-
-
33646024301
-
A Statistical Theory of Chord under Churn
-
van Renesse, R. (ed.) IPTPS 2005. Springer, Heidelberg
-
Krishnamurthy, S., El-Ansary, S., Aurell, E., Haridi, S.: A Statistical Theory of Chord Under Churn. In: van Renesse, R. (ed.) IPTPS 2005. LNCS, vol. 3640, pp. 93-103. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3640
, pp. 93-103
-
-
Krishnamurthy, S.1
El-Ansary, S.2
Aurell, E.3
Haridi, S.4
-
14
-
-
0742276097
-
Inside the slammer worm
-
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the slammer worm. IEEE Security & Privacy 1(4), 33-39 (2003)
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
15
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
Stoica, I., Morris, R., Karger, D., Kaashoek, M., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Computer Communication Review 31(4), 149-160 (2001)
-
(2001)
ACM SIGCOMM Computer Communication Review
, vol.31
, Issue.4
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.4
Balakrishnan, H.5
-
18
-
-
34547936756
-
A PRoactive Malware Identification System based on the Computer Hygiene Principles
-
Vlachos, V., Spinellis, D.: A PRoactive Malware Identification System based on the Computer Hygiene Principles. Information Management and Computer Security 15(4), 295-312 (2007)
-
(2007)
Information Management and Computer Security
, vol.15
, Issue.4
, pp. 295-312
-
-
Vlachos, V.1
Spinellis, D.2
-
20
-
-
33847258726
-
A Peer-to-Peer Collaborative Intrusion Detection System
-
IEEE
-
Zhou, C.V., Karunasekera, S., Leckie, C.: A Peer-to-Peer Collaborative Intrusion Detection System. In: 13th IEEE International Conference on Networks, vol. 1, p. 6. IEEE (2006)
-
(2006)
13th IEEE International Conference on Networks
, vol.1
, pp. 6
-
-
Zhou, C.V.1
Karunasekera, S.2
Leckie, C.3
-
21
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
Zhou, C., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Computers & Security 29(1), 124-140 (2010)
-
(2010)
Computers & Security
, vol.29
, Issue.1
, pp. 124-140
-
-
Zhou, C.1
Leckie, C.2
Karunasekera, S.3
|