-
1
-
-
73549113094
-
A taxonomy and survey of cloud computing systems
-
B. P. Rimal, E. Choi, and I. Lumb, "A taxonomy and survey of cloud computing systems," in Fifth International Joint Conference on INC, IMS and IDC, 2009. NCM '09. IEEE, Aug. 2009, pp. 44-51.
-
Fifth International Joint Conference on INC, IMS and IDC, 2009. NCM '09. IEEE, Aug. 2009
, pp. 44-51
-
-
Rimal, B.P.1
Choi, E.2
Lumb, I.3
-
2
-
-
0028513870
-
Network firewalls
-
Sep.
-
S. M. Bellovin and W. R. Cheswick, "Network firewalls," IEEE Communications Magazine, vol. 32, no. 9, pp. 50-57, Sep. 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 50-57
-
-
Bellovin, S.M.1
Cheswick, W.R.2
-
3
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
Apr.
-
H. Debar, M. Dacier, and A. Wespi, "Towards a taxonomy of intrusion-detection systems," Computer Networks, vol. 31, no. 8, pp. 805-822, Apr. 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
5
-
-
0002473030
-
DIDS (Distributed intrusion detection system) - Motivation, architecture, and an early prototype
-
S. R. Snapp, J. Brentano, G. V. Dias, T. L. Goan, L. T. Heberlein, C.-l. Ho, K. N. Levitt, B. Mukherjee, S. E. Smaha, T. Grance, D. M. Teal, and D. Mansur, "DIDS (Distributed intrusion detection system) - motivation, architecture, and an early prototype," in proceedings of the 14th national computer security conference, pp. 167-176, 1991.
-
(1991)
Proceedings of the 14th National Computer Security Conference
, pp. 167-176
-
-
Snapp, S.R.1
Brentano, J.2
Dias, G.V.3
Goan, T.L.4
Heberlein, L.T.5
Ho, C.-L.6
Levitt, K.N.7
Mukherjee, B.8
Smaha, S.E.9
Grance, T.10
Teal, D.M.11
Mansur, D.12
-
6
-
-
84955580290
-
An architecture for intrusion detection using autonomous agents
-
J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, E. Spafford, and D. Zamboni, "An architecture for intrusion detection using autonomous agents," in Computer Security Applications Conference, 1998, Proceedings., 14th Annual. IEEE, Dec. 1998, pp. 13-24.
-
Computer Security Applications Conference, 1998, Proceedings., 14th Annual. IEEE, Dec. 1998
, pp. 13-24
-
-
Balasubramaniyan, J.S.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
7
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
Feb.
-
C. V. Zhou, C. Leckie, and S. Karunasekera, "A survey of coordinated attacks and collaborative intrusion detection," Computers & Security, vol. 29, no. 1, pp. 124-140, Feb. 2010.
-
(2010)
Computers & Security
, vol.29
, Issue.1
, pp. 124-140
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
-
9
-
-
85090433665
-
Snort - Lightweight intrusion detection for networks
-
ser. LISA '99. Berkeley, CA, USA: USENIX Association, [Online]. Available
-
M. Roesch, "Snort - lightweight intrusion detection for networks," in Proceedings of the 13th USENIX conference on System administration, ser. LISA '99. Berkeley, CA, USA: USENIX Association, 1999, p. 229-238. [Online]. Available: http://dl.acm.org/citation.cfm?id=1039834.1039864
-
(1999)
Proceedings of the 13th USENIX Conference on System Administration
, pp. 229-238
-
-
Roesch, M.1
-
10
-
-
84867724346
-
-
I. S. Institute, "RFC 793 (TCP)," [Online]. Available: www.ietf.org/rfc/rfc793.txt
-
I. S. Institute, "RFC 793 (TCP)," www.ietf.org/rfc/rfc793.txt, 1981. [Online]. Available: www.ietf.org/rfc/rfc793.txt
-
(1981)
-
-
-
12
-
-
37849009761
-
Distributed evasive scan techniques and countermeasures
-
ser. DIMVA '07. Berlin, Heidelberg: Springer-Verlag
-
M. G. Kang, J. Caballero, and D. Song, "Distributed evasive scan techniques and countermeasures," in Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, ser. DIMVA '07. Berlin, Heidelberg: Springer-Verlag, 2007, p. 157-174.
-
(2007)
Proceedings of the 4th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 157-174
-
-
Kang, M.G.1
Caballero, J.2
Song, D.3
|