-
1
-
-
74849129720
-
New data mining technique to enhance IDS alarms quality
-
S Al-Mamory, and H Zhang New data mining technique to enhance IDS alarms quality Journal in Computer Virology 6 2010 43 55
-
(2010)
Journal in Computer Virology
, vol.6
, pp. 43-55
-
-
Al-Mamory, S.1
Zhang, H.2
-
2
-
-
70449353683
-
Identifying false alarm for network intrusion detection system using data mining and decision tree
-
NB Anuar, H Sallehudin, A Gan, and O Zakari Identifying false alarm for network intrusion detection system using data mining and decision tree Malaysian Journal of Computer Science 21 2008 101 115
-
(2008)
Malaysian Journal of Computer Science
, vol.21
, pp. 101-115
-
-
Anuar, N.B.1
Sallehudin, H.2
Gan, A.3
Zakari, O.4
-
6
-
-
84866674580
-
Virtual machine monitor-based lightweight intrusion detection
-
F Azmandian, M Moffie, M Alshawabkeh, J Dy, J Aslam, and D Kaeli Virtual machine monitor-based lightweight intrusion detection SIGOPS - Operating Systems Review 45 2011 38 53
-
(2011)
SIGOPS - Operating Systems Review
, vol.45
, pp. 38-53
-
-
Azmandian, F.1
Moffie, M.2
Alshawabkeh, M.3
Dy, J.4
Aslam, J.5
Kaeli, D.6
-
7
-
-
84870663813
-
-
ed.: Syngress Media Inc
-
Beale J, AR Baker,B Caswell, and M Poor, Snort 2.1 Intrusion Detection, ed.: Syngress Media Inc, 2004, p. 25
-
(2004)
Snort 2.1 Intrusion Detection
, pp. 25
-
-
Beale, J.1
Baker, A.R.2
Caswell, B.3
Poor, M.4
-
10
-
-
47749125439
-
-
M Bubak, G van Albada, J Dongarra, P Sloot, Springer Berlin/Heidelberg
-
A Byrski, and M Carvalho M Bubak, G van Albada, J Dongarra, P Sloot, Agent-Based Immunological Intrusion Detection System for Mobile Ad-Hoc Networks Computational Science - ICCS 2008 5103 2008 Springer Berlin/Heidelberg 584 593
-
(2008)
Agent-Based Immunological Intrusion Detection System for Mobile Ad-Hoc Networks Computational Science - ICCS 2008
, vol.5103
, pp. 584-593
-
-
Byrski, A.1
Carvalho, M.2
-
11
-
-
31544436627
-
Denial-of-service attack-detection techniques
-
G Carl, G Kesidis, RR Brooks, and S Rai Denial-of-service attack-detection techniques Internet Computing, IEEE, 10 2006 82 89
-
(2006)
Internet Computing, IEEE
, vol.10
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.R.3
Rai, S.4
-
15
-
-
80955142795
-
The cyber threat landscape: Challenges and future research directions
-
K.-KR Choo The cyber threat landscape: challenges and future research directions Computers & Security 30 2011 719 731
-
(2011)
Computers & Security
, vol.30
, pp. 719-731
-
-
Choo, K.-K.1
-
16
-
-
84860237427
-
Host-based intrusion detection systems adapted from agent-based artificial immune systems
-
O Chung-Ming Host-based intrusion detection systems adapted from agent-based artificial immune systems Neurocomputing 2012
-
(2012)
Neurocomputing
-
-
Chung-Ming, O.1
-
17
-
-
79952065844
-
-
Cloud-Security-Alliance
-
Cloud-Security-Alliance. (2010). Top Threats to Cloud Computing V1.0. Available: 〈https://cloudsecurityalliance.org/topthreats/csathreats.v1.0. pdf〉
-
(2010)
Top Threats to Cloud Computing V1.0.
-
-
-
18
-
-
77949590054
-
Distributed intrusion detection in clouds using mobile agents
-
Dastjerdi AV, KA Bakar, S.G.H. Tabatabaei Sliema
-
Dastjerdi AV, KA Bakar, and SGH Tabatabaei, Distributed intrusion detection in clouds using mobile agents, in Third International Conference on Advanced Engineering Computing and Applications in Sciences, Sliema. pp. 175-180, 2009.
-
(2009)
Third International Conference on Advanced Engineering Computing and Applications in Sciences
, pp. 175-180
-
-
-
19
-
-
79958729447
-
Intrusion detection system in cloud computing environment
-
New York, NY, USA
-
Dhage S, B Meshram, R Rawat, S Padawe, M Paingaokar, and A Misra, Intrusion detection system in cloud computing environment, in International Conference & Workshop on Emerging Trends in Technology, New York, NY, USA pp. 235-9, 2011.
-
(2011)
International Conference & Workshop on Emerging Trends in Technology
, pp. 235-239
-
-
Dhage, S.1
Meshram, B.2
Rawat, R.3
Padawe, S.4
Paingaokar, M.5
Misra, A.6
-
20
-
-
79960556588
-
Alert correlation in collaborative intelligent intrusion detection systems - A survey
-
HT Elshoush, and IM Osman Alert correlation in collaborative intelligent intrusion detection systems - a survey Applied Soft Computing 11 2011 4349 4365
-
(2011)
Applied Soft Computing
, vol.11
, pp. 4349-4365
-
-
Elshoush, H.T.1
Osman, I.M.2
-
22
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
GCE '08 Austin, TX 2008
-
Foster I, Y Zhao, I Raicu, and S Lu, Cloud computing and grid computing 360-degree compared, in Grid Computing Environments Workshop, 2008. GCE '08 Austin, TX. pp. 1-10, 2008
-
(2008)
Grid Computing Environments Workshop
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
23
-
-
0034827684
-
Evaluation of intrusion detectors: A decision theory approach
-
Oakland, CA, USA
-
Gaffney JEJr and JW Ulvila, Evaluation of intrusion detectors: a decision theory approach, in IEEE Symposium on Security and Privacy, 2001. S&P 2001, Oakland, CA, USA. pp. 50-61, 2001.
-
(2001)
IEEE Symposium on Security and Privacy, 2001. S&P 2001
, pp. 50-61
-
-
Gaffney Jr., J.E.1
Ulvila, J.W.2
-
25
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P García-Teodoro, J Díaz-Verdejo, G Maciá- Fernández, and E Vázquez Anomaly-based network intrusion detection: techniques, systems and challenges Computers & Security 28 2009 18 28
-
(2009)
Computers & Security
, vol.28
, pp. 18-28
-
-
García-Teodoro, P.1
Díaz-Verdejo, J.2
MacIá- Fernández, G.3
Vázquez, E.4
-
29
-
-
65549109478
-
-
A Abraham, A-E Hassanien, A de Carvalho, Springer Berlin/ Heidelberg
-
Á Herrero, and E Corchado A Abraham, A-E Hassanien, A de Carvalho, Mining Network Traffic Data for Attacks through MOVICAB-IDS Foundations of Computational Intelligence 4 204 2009 Springer Berlin/ Heidelberg 377 394
-
(2009)
Mining Network Traffic Data for Attacks Through MOVICAB-IDS Foundations of Computational Intelligence
, vol.4204
, pp. 377-394
-
-
Herrero, Á.1
Corchado, E.2
-
30
-
-
68949196337
-
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
-
XD Hoang, J Hu, and P Bertok A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference Journal of Network and Computer Applications 32 2009 1219 1228
-
(2009)
Journal of Network and Computer Applications
, vol.32
, pp. 1219-1228
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
31
-
-
33847743856
-
Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
-
K Hwang, M Cai, Y Chen, and M Qin Hybrid intrusion detection with weighted signature generation over anomalous internet episodes Dependable and Secure Computing, IEEE Transactions on 4 2007 41 55
-
(2007)
Dependable and Secure Computing, IEEE Transactions on
, vol.4
, pp. 41-55
-
-
Hwang, K.1
Cai, M.2
Chen, Y.3
Qin, M.4
-
32
-
-
84870698695
-
Database intrusion prevention cum detection system with appropriate response
-
A Jaiswal, and S Jain Database intrusion prevention cum detection system with appropriate response International Journal of Information Technology 2 2010 651 656
-
(2010)
International Journal of Information Technology
, vol.2
, pp. 651-656
-
-
Jaiswal, A.1
Jain, S.2
-
33
-
-
84888001505
-
A VMM-based intrusion prevention system in cloud computing environment
-
H Jin, G Xiang, D Zou, S Wu, F Zhao, M Li, and W Zheng A VMM-based intrusion prevention system in cloud computing environment The Journal of Supercomputing 2011 1 19
-
(2011)
The Journal of Supercomputing
, pp. 1-19
-
-
Jin, H.1
Xiang, G.2
Zou, D.3
Wu, S.4
Zhao, F.5
Li, M.6
Zheng, W.7
-
36
-
-
84870675643
-
Alarm management for intrusion detection systems - Prioritizing and presenting alarms from intrusion detection systems
-
master of science thesis, University of Gothenburg
-
Klüft S, Alarm management for intrusion detection systems - prioritizing and presenting alarms from intrusion detection systems, Master, Computer Science Programme, master of science thesis, University of Gothenburg, 〈http://hdl.handle.net/2077/28856〉, 2012.
-
(2012)
Master, Computer Science Programme
-
-
Klüft, S.1
-
38
-
-
84863933146
-
CIDS: A Framework for Intrusion Detection in Cloud Systems
-
Las Vegas, NV
-
Kholidy HA and F. Baiardi, CIDS: a Framework for Intrusion Detection in Cloud Systems, in Ninth International Conference on Information Technology: New Generations (ITNG), Las Vegas, NV, pp. 379-5, 2012.
-
(2012)
Ninth International Conference on Information Technology: New Generations (ITNG)
, pp. 379-385
-
-
Kholidy, H.A.1
Baiardi, F.2
-
39
-
-
84858158707
-
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
-
MT Khorshed, ABMS Ali, and SA Wasimi A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing Future Generation Computer Systems 28 2012 833 851
-
(2012)
Future Generation Computer Systems
, vol.28
, pp. 833-851
-
-
Khorshed, M.T.1
Ali, A.2
Wasimi, S.A.3
-
40
-
-
84870688838
-
System intrusion detection and prevention
-
JM Kizza, Springer London
-
JM Kizza System intrusion detection and prevention JM Kizza, A Guide to Computer Network Security 2009 Springer London 273 298
-
(2009)
A Guide to Computer Network Security
, pp. 273-298
-
-
Kizza, J.M.1
-
41
-
-
79955677448
-
Multi-level Intrusion Detection System and log management in Cloud Computing
-
Seoul
-
Lee JH, MW Park, JH Eom, and TM Chung, Multi-level Intrusion Detection System and log management in Cloud Computing, in 13th international conference on advanced communication technology (ICACT), Seoul, pp. 552-5, 2011.
-
(2011)
13th International Conference on Advanced Communication Technology (ICACT)
, pp. 552-555
-
-
Lee, J.H.1
Park, M.W.2
Eom, J.H.3
Chung, T.M.4
-
42
-
-
79955677448
-
Multi-level intrusion detection system and log management in cloud computing
-
Lee JH, MW Park, JH Eom, and TM Chung, Multi-level intrusion detection system and log management in cloud computing, 13th international conference on advanced communication technology (ICACT), pp. 552-5, 2011.
-
(2011)
13th International Conference on Advanced Communication Technology (ICACT)
, pp. 552-555
-
-
Lee, J.H.1
Park, M.W.2
Eom, J.H.3
Chung, T.M.4
-
43
-
-
34748897336
-
Fault management based on peer-to-peer paradigms; A case study report from the celtic project madeira
-
Leitner M, Leitner P, Zach M, Collins S, Fahy C, Fault management based on peer-to-peer paradigms; a case study report from the celtic project madeira, in 10th IFIP/IEEE International Symposium on Integrated Network Management, pp. 697-700, 2007.
-
(2007)
10th IFIP/IEEE International Symposium on Integrated Network Management
, pp. 697-700
-
-
Leitner, M.1
Leitner, P.2
Zach, M.3
Collins, S.4
Fahy, C.5
-
44
-
-
33749575854
-
An immunity-based dynamic multilayer intrusion detection system
-
D-S Huang, K Li, G Irwin, Springer Berlin Heidelberg
-
G Liang, T Li, J Ni, Y. Jiang, J Yang, and X Gong An immunity-based dynamic multilayer intrusion detection system D-S Huang, K Li, G Irwin, Computational Intelligence and Bioinformatics 4115 2006 Springer Berlin Heidelberg 641 650
-
(2006)
Computational Intelligence and Bioinformatics
, vol.4115
, pp. 641-650
-
-
Liang, G.1
Li, T.2
Ni, J.3
Jiang, Y.4
Yang, J.5
Gong, X.6
-
45
-
-
84958970105
-
The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
-
A Wespi, G Vigna, L Deri, Springer Berlin/ Heidelberg
-
R. Lippmann, S Webster, and D Stetson The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection A Wespi, G Vigna, L Deri, Recent Advances in Intrusion Detection 2516 2002 Springer Berlin/ Heidelberg 307 326
-
(2002)
Recent Advances in Intrusion Detection
, vol.2516
, pp. 307-326
-
-
Lippmann, R.1
Webster, S.2
Stetson, D.3
-
46
-
-
78649533718
-
-
K Li, M Fei, L Jia, G Irwin, Springer Berlin/Heidelberg
-
Y Li, C Jing, and J Xu K Li, M Fei, L Jia, G Irwin, A New Distributed Intrusion Detection Method Based on Immune Mobile Agent Life System Modeling and Intelligent Computing 6328 2010 Springer Berlin/Heidelberg 233 243
-
(2010)
A New Distributed Intrusion Detection Method Based on Immune Mobile Agent Life System Modeling and Intelligent Computing
, vol.6328
, pp. 233-243
-
-
Li, Y.1
Jing, C.2
Xu, J.3
-
47
-
-
81355154787
-
An ontology-based intrusion alerts correlation system
-
W Li, and S Tian An ontology-based intrusion alerts correlation system Expert Systems with Applications 37 2010 7138 7146
-
(2010)
Expert Systems with Applications
, vol.37
, pp. 7138-7146
-
-
Li, W.1
Tian, S.2
-
48
-
-
66449085932
-
Reducing false positives in anomaly detectors through fuzzy alert aggregation
-
F Maggi, M Matteucci, and S Zanero Reducing false positives in anomaly detectors through fuzzy alert aggregation Information Fusion 10 2009 300 311
-
(2009)
Information Fusion
, vol.10
, pp. 300-311
-
-
Maggi, F.1
Matteucci, M.2
Zanero, S.3
-
50
-
-
78650528752
-
Malware detection based on cloud computing integrating intrusion ontology representation
-
Bogota
-
Martínez CA, Echeverri GI, and Sanz AGC, Malware detection based on cloud computing integrating intrusion ontology representation, in IEEE Latin-American Conference on Communications (LATINCOM), Bogota, pp. 1-6, 2010.
-
(2010)
IEEE Latin-American Conference on Communications (LATINCOM)
, pp. 1-6
-
-
Martínez, C.A.1
Echeverri, G.I.2
Sanz, A.G.C.3
-
51
-
-
84860563303
-
Cloud-based malware detection for evolving data streams
-
MM Masud, TM Al-Khateeb, KW Hamlen, J Gao, L Khan, J Han, and B Thuraisingham Cloud-based malware detection for evolving data streams ACM Transactions Management Information Systems 2 2008 1 27
-
(2008)
ACM Transactions Management Information Systems
, vol.2
, pp. 1-27
-
-
Masud, M.M.1
Al-Khateeb, T.M.2
Hamlen, K.W.3
Gao, J.4
Khan, L.5
Han, J.6
Thuraisingham, B.7
-
52
-
-
79960583168
-
The Big Picture of insider it sabotage across U.S. critical infrastructures
-
S J Stolfo, SM Bellovin, AD Keromytis, S Hershkop, SW Smith, S Sinclair, Springer US
-
AP Moore, DM Cappelli, and RF Trzeciak The Big Picture of insider it sabotage across U.S. critical infrastructures S J Stolfo, SM Bellovin, AD Keromytis, S Hershkop, SW Smith, S Sinclair, Insider Attack and Cyber Security 39 2008 Springer US 17 52
-
(2008)
Insider Attack and Cyber Security
, vol.39
, pp. 17-52
-
-
Moore, A.P.1
Cappelli, D.M.2
Trzeciak, R.F.3
-
53
-
-
83455235904
-
Current intrusion detection techniques in information technology - A detailed analysis
-
GM Nazer, and AAL Selvakumar Current intrusion detection techniques in information technology - a detailed analysis European Journal of Scientific Research 65 2011 611 624
-
(2011)
European Journal of Scientific Research
, vol.65
, pp. 611-624
-
-
Nazer, G.M.1
Selvakumar, A.A.L.2
-
54
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
A Patcha, and J-M Park An overview of anomaly detection techniques: existing solutions and latest technological trends Computer Networks 51 2007 3448 3470
-
(2007)
Computer Networks
, vol.51
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
55
-
-
84926184444
-
Autonomic agent-based self-managed intrusion detection and prevention system
-
Port Elizabeth, South Africa
-
Patel A, Qassim Q, Shukor Z, Nogueira J, Júnior J, Wills C, Autonomic agent-based self-managed intrusion detection and prevention system, in South African information security multi-conference (SAISMC 2010), Port Elizabeth, South Africa, pp. 223-24, 2009.
-
(2009)
South African Information Security Multi-conference (SAISMC 2010)
, pp. 223-224
-
-
Patel, A.Q.1
-
58
-
-
27644590551
-
Data mining and machine learning - Towards reducing false positives in intrusion detection
-
T Pietraszek, and A Tanner Data mining and machine learning - towards reducing false positives in intrusion detection Information Security Technical Report 10 2005 169 183
-
(2005)
Information Security Technical Report
, vol.10
, pp. 169-183
-
-
Pietraszek, T.1
Tanner, A.2
-
59
-
-
78449264726
-
Incremental hybrid intrusion detection using ensemble of weak classifiers
-
H Sarbazi-Azad, B Parhami, S-G Miremadi, S Hessabi, Springer Berlin Heidelberg
-
A Rasoulifard, A Ghaemi Bafghi, and M Kahani Incremental hybrid intrusion detection using ensemble of weak classifiers H Sarbazi-Azad, B Parhami, S-G Miremadi, S Hessabi, Advances in Computer Science and Engineering 6 2009 Springer Berlin Heidelberg 577 584
-
(2009)
Advances in Computer Science and Engineering
, vol.6
, pp. 577-584
-
-
Rasoulifard, A.1
Ghaemi Bafghi, A.2
Kahani, M.3
-
60
-
-
77950559014
-
Intrusion detection in the Cloud
-
Roschke S, F Cheng, and C Meinel, Intrusion detection in the Cloud, presented at the Eighth IEEE international conference on dependable, autonomic and secure computing, pp. 729-34, 2009.
-
(2009)
Presented at the Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
, pp. 729-734
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
61
-
-
58149104386
-
Guide to Intrusion Detection and Prevention Systems (idps)
-
NIST
-
K Scarfone, and P Mell Guide to Intrusion Detection and Prevention Systems (idps) Special Publication 800 2007 NIST p. 94
-
(2007)
Special Publication
, vol.800
, pp. 94
-
-
Scarfone, K.1
Mell, P.2
-
63
-
-
77950675112
-
Google android: A comprehensive security assessment
-
A Shabtai, Y Fledel, U Kanonov, Y Elovici, S Dolev, and C Glezer Google android: a comprehensive security assessment Secur. Privacy IEEE 8 2010 35 44
-
(2010)
Secur. Privacy IEEE
, vol.8
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
65
-
-
33748619234
-
Applying genetic algorithm for classifying anomalous TCP/IP packets
-
T Shon, X Kovah, and J Moon Applying genetic algorithm for classifying anomalous TCP/IP packets Neurocomputing 69 2006 2429 2433
-
(2006)
Neurocomputing
, vol.69
, pp. 2429-2433
-
-
Shon, T.1
Kovah, X.2
Moon, J.3
-
66
-
-
79960708660
-
A multiagent-based intrusion detection system with the support of multi-class supervised classification
-
L Cao, Springer US
-
M-L Shyu, and V Sainani A multiagent-based intrusion detection system with the support of multi-class supervised classification L Cao, Data Mining and Multi-agent Integration 2009 Springer US 127 142
-
(2009)
Data Mining and Multi-agent Integration
, pp. 127-142
-
-
Shyu, M.-L.1
Sainani, V.2
-
67
-
-
3042640871
-
A smart sensor to detect the falls of the elderly
-
A. Smith, and N Johnson A smart sensor to detect the falls of the elderly Pervasive Computing, IEEE 3 2004 42 47
-
(2004)
Pervasive Computing, IEEE
, vol.3
, pp. 42-47
-
-
Smith, A.1
Johnson, N.2
-
68
-
-
78649864973
-
An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems
-
Seoul
-
Smith D, Q Guan, and S Fu, An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems, 34th Annual Computer Software and Applications Conference Workshops (COMPSACW), Seoul, pp. 376-1, 2010.
-
(2010)
34th Annual Computer Software and Applications Conference Workshops (COMPSACW)
, pp. 376-381
-
-
Smith, D.1
Guan, Q.2
Fu, S.3
-
69
-
-
71649091715
-
Reducing false positives in intrusion detection systems
-
GP Spathoulas, and SK Katsikas Reducing false positives in intrusion detection systems Computers & Security 29 2010 35 44
-
(2010)
Computers & Security
, vol.29
, pp. 35-44
-
-
Spathoulas, G.P.1
Katsikas, S.K.2
-
70
-
-
38049134012
-
Distributed instrusion prevention in active and extensible networks active networks
-
G Minden, K Calvert, M Solarski, M Yamamoto, Springer Berlin/Heidelberg
-
T Sproull, and J Lockwood Distributed instrusion prevention in active and extensible networks active networks G Minden, K Calvert, M Solarski, M Yamamoto, Lecture Notes in Computer Science 3912 2007 Springer Berlin/Heidelberg 54 65
-
(2007)
Lecture Notes in Computer Science
, vol.3912
, pp. 54-65
-
-
Sproull, T.1
Lockwood, J.2
-
72
-
-
67349229828
-
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach
-
M-Y Su, G-J Yu, and C-Y Lin A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach Computers & Security 28 2009 301 309
-
(2009)
Computers & Security
, vol.28
, pp. 301-309
-
-
Su, M.-Y.1
Yu, G.-J.2
Lin, C.-Y.3
-
73
-
-
66449123983
-
Integrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS
-
BK Sy Integrating intrusion alert information to aid forensic explanation: an analytical intrusion detection framework for distributive IDS Inf. Fusion 10 2009 325 341
-
(2009)
Inf. Fusion
, vol.10
, pp. 325-341
-
-
Sy, B.K.1
-
74
-
-
77958047034
-
Ontological approach toward cybersecurity in cloud computing
-
Taganrog, Rostov-on-Don, Russian Federation
-
Takahashi T, Y Kadobayashi, and H Fujiwara, Ontological approach toward cybersecurity in cloud computing, presented at the Proceedings of the 3rd international conference on Security of information and networks, Taganrog, Rostov-on-Don, Russian Federation, 2010.
-
(2010)
Presented at the Proceedings of the 3rd International Conference on Security of Information and Networks
-
-
Takahashi, T.1
Kadobayashi, Y.2
Fujiwara, H.3
-
76
-
-
77955430292
-
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
-
GC Tjhai, SM Furnell, M Papadaki, and NL Clarke A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm Computers & Security 29 2010 712 723
-
(2010)
Computers & Security
, vol.29
, pp. 712-723
-
-
Tjhai, G.C.1
Furnell, S.M.2
Papadaki, M.3
Clarke, N.L.4
-
78
-
-
84856085485
-
Intrusion Detection Techniques for Infrastructure as a Service Cloud
-
Tupakula U, V Varadharajan, and N Akku, Intrusion Detection Techniques for Infrastructure as a Service Cloud, IEEE International Conference on Dependable, Autonomic and Secure Computing pp. 744-1, 2011.
-
(2011)
IEEE International Conference on Dependable, Autonomic and Secure Computing
, pp. 744-751
-
-
Tupakula, U.1
Varadharajan, V.2
Akku, N.3
-
79
-
-
69349098776
-
Cloud computing and the common man
-
J Viega Cloud computing and the common man Computer 42 2009 106 108
-
(2009)
Computer
, vol.42
, pp. 106-108
-
-
Viega, J.1
-
82
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
Charleston, SC.
-
Wang C, Q Wang, K Ren, and W Lou, Ensuring data storage security in cloud computing, in 17th International Workshop on Quality of Service, 2009. IWQoS, Charleston, SC. pp. 1-9, 2009
-
(2009)
17th International Workshop on Quality of Service, 2009. IWQoS
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
84
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
SX Wu, and W Banzhaf The use of computational intelligence in intrusion detection systems: a review Applied Soft Computing 10 2010 1 35
-
(2010)
Applied Soft Computing
, vol.10
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
86
-
-
78651468417
-
Research on the Intrusion detection mechanism based on cloud computing
-
Guilin
-
Xin W, H Ting-lei, and L Xiao-yu, Research on the Intrusion detection mechanism based on cloud computing, in 2010 International Conference on Intelligent Computing and Integrated Systems (ICISS), Guilin, pp. 125-8, 2010.
-
(2010)
2010 International Conference on Intelligent Computing and Integrated Systems (ICISS)
, pp. 125-128
-
-
Xin, W.1
Ting-Lei, H.2
Xiao-Yu, L.3
-
87
-
-
78049324449
-
Correlation analysis of intrusion alerts
-
Springer US 65-92
-
D Xu, and P Ning Correlation analysis of intrusion alerts Intrusion Detection Systems 38 2008 Springer US 65-92
-
(2008)
Intrusion Detection Systems
, vol.38
-
-
Xu, D.1
Ning, P.2
-
88
-
-
78049461565
-
A cost-based analysis of intrusion detection system configuration under active or passive response
-
WT Yue, and M Çakanyldrm A cost-based analysis of intrusion detection system configuration under active or passive response Decision Support System 50 2010 21 31
-
(2010)
Decision Support System
, vol.50
, pp. 21-31
-
-
Yue, W.T.1
Çakanyldrm, M.2
-
89
-
-
84857574309
-
Dcdidp: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments
-
Orlando, Florida
-
Zargar ST, H Takabi, and JBD Joshi, Dcdidp: a distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments, in International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Orlando, Florida, 2011.
-
(2011)
International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
-
-
Zargar, S.T.1
Takabi, H.2
Joshi, J.B.D.3
-
90
-
-
70350432620
-
A new intrusion detection method based on antibody concentration emerging intelligent computing technology and applications
-
D-S Huang, K-H Jo, H-H Lee, H-J Kang, V Bevilacqua, Springer Berlin/ Heidelberg
-
J Zeng, T Li, G Li, and H Li A new intrusion detection method based on antibody concentration emerging intelligent computing technology and applications D-S Huang, K-H Jo, H-H Lee, H-J Kang, V Bevilacqua, With Aspects of Artificial Intelligence 5755 2009 Springer Berlin/ Heidelberg 500 509
-
(2009)
With Aspects of Artificial Intelligence
, vol.5755
, pp. 500-509
-
-
Zeng, J.1
Li, T.2
Li, G.3
Li, H.4
-
91
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
CV Zhou, C Leckie, and S Karunasekera A survey of coordinated attacks and collaborative intrusion detection Computers & Security 29 2010 124 140
-
(2010)
Computers & Security
, vol.29
, pp. 124-140
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
|