-
1
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
AV Aho, and MJ Corasick Efficient string matching: an aid to bibliographic search Communications of the ACM 18 1975 333 340
-
(1975)
Communications of the ACM
, vol.18
, pp. 333-340
-
-
Aho, A.V.1
Corasick, M.J.2
-
2
-
-
84866000333
-
Bees algorithm for feature selection in network anomaly detection
-
O Alomari, and ZA Othman Bees algorithm for feature selection in network anomaly detection Journal of Applied Sciences Research 8 2012 1748 1756
-
(2012)
Journal of Applied Sciences Research
, vol.8
, pp. 1748-1756
-
-
Alomari, O.1
Othman, Z.A.2
-
4
-
-
70350341717
-
A survey on intrusion detection in mobile ad hoc networks
-
Y Xiao, X Shen, D-Z Du, Springer-Verlag
-
T Anantvalee, and J Wu A survey on intrusion detection in mobile ad hoc networks Y Xiao, X Shen, D-Z Du, Wireless/mobile network security 2007 Springer-Verlag 170 196
-
(2007)
Wireless/mobile Network Security
, pp. 170-196
-
-
Anantvalee, T.1
Wu, J.2
-
6
-
-
0038223829
-
-
National Institute of Standards and Technology (NIST), Technical Report
-
R Bace, P Mell, Intrusion detection systems, National Institute of Standards and Technology (NIST), Technical Report 800-31, 2001.
-
(2001)
Intrusion detection systems
, pp. 800-831
-
-
Bace, R.1
Mell, P.2
-
8
-
-
84870720639
-
-
CERT
-
CERT, 〈http://www.cert.org/stats〉
-
-
-
-
9
-
-
14344256540
-
On the statistical distribution of processing times in network intrusion detection
-
Paradise Island, Bahamas
-
Cabrera JBD, Gosar J, Lee W, Mehra RK, On the statistical distribution of processing times in network intrusion detection. In: 43rd IEEE conference on decision and control, Paradise Island, Bahamas, 2004, pp. 75-80.
-
(2004)
43rd IEEE Conference on Decision and Control
, pp. 75-80
-
-
Cabrera, J.B.D.1
Gosar, J.2
Lee, W.3
Mehra, R.K.4
-
11
-
-
84863478979
-
A hybrid network intrusion detection system using simplified swarm optimization (SSO)
-
YY Chung, and N Wahid A hybrid network intrusion detection system using simplified swarm optimization (SSO) Applied Soft Computing 12 2012 3014 3022
-
(2012)
Applied Soft Computing
, vol.12
, pp. 3014-3022
-
-
Chung, Y.Y.1
Wahid, N.2
-
12
-
-
84870702552
-
-
ClamAV
-
ClamAV, 〈http://www.clamav.net〉
-
-
-
-
13
-
-
84857877495
-
Real time intrusion prediction based on optimized alerts with hidden Markov model
-
M Couture Real time intrusion prediction based on optimized alerts with hidden Markov model Journal of Networks 7 2012 311 321
-
(2012)
Journal of Networks
, vol.7
, pp. 311-321
-
-
Couture, M.1
-
14
-
-
0033293396
-
Towards a taxonomy of intrusion detection systems
-
H Debar, M Dacier, and A Wespi Towards a taxonomy of intrusion detection systems Computer Networks 31 1999 805 822
-
(1999)
Computer Networks
, vol.31
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
18
-
-
79960556588
-
Alert correlation in collaborative intelligent intrusion detection systems - A survey
-
HT Elshousha, and IM Osmanb Alert correlation in collaborative intelligent intrusion detection systems - a survey Applied Soft Computing 11 2011 4349 4365
-
(2011)
Applied Soft Computing
, vol.11
, pp. 4349-4365
-
-
Elshousha, H.T.1
Osmanb, I.M.2
-
23
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P Garcia-Teodoro, J Diaz-Verdejo, G Macia-Fernandez, and E Vazquez Anomaly-based network intrusion detection: techniques, systems and challenges Computers & Security 28 2009 18 28
-
(2009)
Computers & Security
, vol.28
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Diaz-Verdejo, J.2
MacIa-Fernandez, G.3
Vazquez, E.4
-
24
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
San Diego, California, USA
-
Garfinkel T, Rosenblum M, A virtual machine introspection based architecture for intrusion detection. In: Network and distributed systems security symposium, San Diego, California, USA, 2003
-
(2003)
Network and Distributed Systems Security Symposium
-
-
Garfinkel, T.1
Rosenblum, M.2
-
25
-
-
70350637734
-
Signature matching in network processing using SIMD/GPU architectures
-
Goyal N, Ormont J, Smith R, Sankaralingam K, Estan C, Signature matching in network processing using SIMD/GPU architectures, University of Wisconsin-Madison, Technical Report 1628, 2008.
-
(2008)
University of Wisconsin-Madison, Technical Report 1628
-
-
Goyal, N.1
Ormont, J.2
Smith, R.3
Sankaralingam, K.4
Estan, C.5
-
26
-
-
84863242123
-
Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems
-
C-Y Ho, Y-C Lai, I-W Chen, F-Y Wang, and W-H Tai Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems IEEE Communications Magazine 50 2012 146 154
-
(2012)
IEEE Communications Magazine
, vol.50
, pp. 146-154
-
-
Ho, C.-Y.1
Lai, Y.-C.2
Chen, I.-W.3
Wang, F.-Y.4
Tai, W.-H.5
-
27
-
-
77956613687
-
A novel intrusion detection system based on hierarchical clustering and support vector machines
-
SJ Horng, MY Su, YH Chen, TW Kao, RJ Chen, JL Lai, and CD Perkasa A novel intrusion detection system based on hierarchical clustering and support vector machines Expert Systems with Applications 38 2011 306 313
-
(2011)
Expert Systems with Applications
, vol.38
, pp. 306-313
-
-
Horng, S.J.1
Su, M.Y.2
Chen, Y.H.3
Kao, T.W.4
Chen, R.J.5
Lai, J.L.6
Perkasa, C.D.7
-
28
-
-
77953999220
-
Scalable multi-pipeline architecture for high performance multi-pattern string matching
-
Atlanta, Georgia USA
-
W Jiang, Y-HE Yang, VK Prasanna, Scalable multi-pipeline architecture for high performance multi-pattern string matching. In: 24th IEEE international parallel and distributed processing symposium, Atlanta, Georgia USA, 2010, pp. 1-12.
-
(2010)
24th IEEE International Parallel and Distributed Processing Symposium
, pp. 1-12
-
-
Jiang, W.1
Yang, Y.2
Prasanna, V.K.3
-
31
-
-
78449293060
-
A game-based intrusion detection mechanism to confront internal attackers
-
I Kantzavelou, and S Katsikas A game-based intrusion detection mechanism to confront internal attackers Computers & Security 29 2010 859 874
-
(2010)
Computers & Security
, vol.29
, pp. 859-874
-
-
Kantzavelou, I.1
Katsikas, S.2
-
32
-
-
84857986229
-
A new approach to intrusion detection system
-
A Kartit, A Saidi, F Bezzazi, ME Marraki, and A Radi A new approach to intrusion detection system Journal of theoretical and applied information technology 36 2012 284 289
-
(2012)
Journal of Theoretical and Applied Information Technology
, vol.36
, pp. 284-289
-
-
Kartit, A.1
Saidi, A.2
Bezzazi, F.3
Marraki, M.E.4
Radi, A.5
-
34
-
-
32044466453
-
HyperSpector: Virtual distributed monitoring environments for secure intrusion detection
-
Chicago, IL, USA
-
Kourai K, Chiba S, HyperSpector: virtual distributed monitoring environments for secure intrusion detection. In: First ACM/USENIX international conference on virtual execution environments, Chicago, IL, USA, 2005, pp. 197-207.
-
(2005)
First ACM/USENIX International Conference on Virtual Execution Environments
, pp. 197-207
-
-
Kourai, K.1
Chiba, S.2
-
35
-
-
6344293153
-
A survey on intrusion detection systems
-
Krugel C, Toth T, A survey on intrusion detection systems, Technical University of Vienna, Austria, Technical Report TUV-1841-00-11 (2000), pp. 22-33.
-
(2000)
Technical University of Vienna, Austria, Technical Report TUV-1841-00-11
, pp. 22-33
-
-
Krugel, C.1
Toth, T.2
-
39
-
-
84875120576
-
The application of genetic algorithm to intrusion detection in MP2P network
-
Shenzhen, China
-
L Li, Zhang G, Nie J, Niu Y, Yao A, The application of genetic algorithm to intrusion detection in MP2P network. In: Third international conference on advances in swarm intelligence, Shenzhen, China, 2012, pp. 390-397.
-
(2012)
Third International Conference on Advances in Swarm Intelligence
, pp. 390-397
-
-
Li, L.1
Zhang, G.2
Nie, J.3
Niu, Y.4
Yao, A.5
-
40
-
-
81855197007
-
An efficient intrusion detection system based on support vector machines and gradually feature removal method
-
Y Li, J Xia, S Zhang, J Yan, X Ai, and K Dai An efficient intrusion detection system based on support vector machines and gradually feature removal method Expert Systems with Applications 39 2012 424 430
-
(2012)
Expert Systems with Applications
, vol.39
, pp. 424-430
-
-
Li, Y.1
Xia, J.2
Zhang, S.3
Yan, J.4
Ai, X.5
Dai, K.6
-
41
-
-
0027609384
-
A survey of intrusion detection techniques
-
TF Lunt A survey of intrusion detection techniques Computers & Security 12 1993 405 418
-
(1993)
Computers & Security
, vol.12
, pp. 405-418
-
-
Lunt, T.F.1
-
43
-
-
84860824793
-
Intelligent intrusion detection and robust null defense for wireless networks
-
J Mar, IF Hsiao, YC Yeh, CC Kuo, and SR Wu Intelligent intrusion detection and robust null defense for wireless networks International Journal of Innovative Computing Information and Control 8 2012 3341 3359
-
(2012)
International Journal of Innovative Computing Information and Control
, vol.8
, pp. 3341-3359
-
-
Mar, J.1
Hsiao, I.F.2
Yeh, Y.C.3
Kuo, C.C.4
Wu, S.R.5
-
45
-
-
84870682511
-
A survey of intrusion detection techniques in Cloud
-
Online
-
C Modi, D Patel, B Borisaniya, H Patel, A Patel, M Rajarajan, A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications. Available Online 2012.
-
(2012)
Journal of Network and Computer Applications
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, H.4
Patel, A.5
Rajarajan, M.6
-
46
-
-
77249132188
-
A survey of network virtualization
-
NMMK Mosharaf, and R Boutaba A survey of network virtualization Computer Networks 54 2010 862 876
-
(2010)
Computer Networks
, vol.54
, pp. 862-876
-
-
Mosharaf, N.1
Boutaba, R.2
-
48
-
-
0344666724
-
A comparative study of techniques for intrusion detection
-
Sacramento, California, USA
-
Mukkamala S, Sung AH, A comparative study of techniques for intrusion detection, In: 15th IEEE international conference on tools with artificial intelligence, Sacramento, California, USA, 2003, pp. 570-577.
-
(2003)
15th IEEE International Conference on Tools with Artificial Intelligence
, pp. 570-577
-
-
Mukkamala, S.1
Sung, A.H.2
-
49
-
-
33847256909
-
A survey on intrusion detection approaches
-
Karachi, Pakistan
-
Murali A, Rao M, A survey on intrusion detection approaches, In: First international conference information and communication technologies, Karachi, Pakistan, 2005, pp. 233-240.
-
(2005)
First International Conference Information and Communication Technologies
, pp. 233-240
-
-
Murali, A.1
Rao, M.2
-
51
-
-
84870715786
-
Comprehensive survey on game theory based intrusion detection system for mobile adhoc networks
-
B Paramasivan, and KM Pitchai Comprehensive survey on game theory based intrusion detection system for mobile adhoc networks International Journal of Computing Applications 5 2011 23 29
-
(2011)
International Journal of Computing Applications
, vol.5
, pp. 23-29
-
-
Paramasivan, B.1
Pitchai, K.M.2
-
52
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
A Patcha, and JM Park An overview of anomaly detection techniques: existing solutions and latest technological trends Computer Networks 51 2007 3448 3470
-
(2007)
Computer Networks
, vol.51
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
53
-
-
48649085344
-
Secure and flexible monitoring of virtual machines
-
Miami Beach, FL
-
Payne BD, Carbone M, Lee W, Secure and flexible monitoring of virtual machines, In: 23rd annual computer security applications conference, Miami Beach, FL, 2007, pp. 385-397.
-
(2007)
23rd Annual Computer Security Applications Conference
, pp. 385-397
-
-
Payne, B.D.1
Carbone, M.2
Lee, W.3
-
57
-
-
58149096660
-
Intrusion detection: A survey
-
Sliema, Malta
-
Sabahi F, Movaghar A, Intrusion detection: a survey, In: Third international conference on system and network communication, Sliema, Malta, 2008, pp. 23-26
-
(2008)
Third International Conference on System and Network Communication
, pp. 23-26
-
-
Sabahi, F.1
Movaghar, A.2
-
58
-
-
70450211167
-
Improving Snort performance under Linux
-
K Salah, and A Kahtani Improving Snort performance under Linux IET Communications 3 2009 1883 1895
-
(2009)
IET Communications
, vol.3
, pp. 1883-1895
-
-
Salah, K.1
Kahtani, A.2
-
59
-
-
70349745178
-
Performance evaluation comparison of Snort NIDS under Linux and Windows Server
-
K Salah, and A Kahtani Performance evaluation comparison of Snort NIDS under Linux and Windows Server Journal of Network and Computer Applications 33 2010 6 15
-
(2010)
Journal of Network and Computer Applications
, vol.33
, pp. 6-15
-
-
Salah, K.1
Kahtani, A.2
-
61
-
-
80052488466
-
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
-
S Sen, and JA Clark Evolutionary computation techniques for intrusion detection in mobile ad hoc networks Computer Networks 55 2011 3441 3457
-
(2011)
Computer Networks
, vol.55
, pp. 3441-3457
-
-
Sen, S.1
Clark, J.A.2
-
62
-
-
65249105995
-
Accurate anomaly detection through parallelism
-
S Shanbhag, and T Wolf Accurate anomaly detection through parallelism IEEE Network 23 2009 22 28
-
(2009)
IEEE Network
, vol.23
, pp. 22-28
-
-
Shanbhag, S.1
Wolf, T.2
-
63
-
-
80052425981
-
Signaling game based strategy of intrusion detection in wireless sensor networks
-
S Shena, Y Li, H Xua, and Q Caoa Signaling game based strategy of intrusion detection in wireless sensor networks Computers & Mathematics with Applications 62 2011 2404 2416
-
(2011)
Computers & Mathematics with Applications
, vol.62
, pp. 2404-2416
-
-
Shena, S.1
Li, Y.2
Xua, H.3
Caoa, Q.4
-
64
-
-
84870694115
-
-
Snort
-
Snort, 〈http://www.snort.org〉
-
-
-
-
68
-
-
78249247403
-
GrAVity: A massively parallel antivirus engine
-
Ottawa, Ontario, Canada
-
Vasiliadis G, Ioannidis S, GrAVity: a massively parallel antivirus engine, In: Third international conference on recent advances in intrusion detection, Ottawa, Ontario, Canada, 2010, pp. 79-96.
-
(2010)
Third International Conference on Recent Advances in Intrusion Detection
, pp. 79-96
-
-
Vasiliadis, G.1
Ioannidis, S.2
-
69
-
-
56549099368
-
Gnort: High performance network intrusion detection using graphics processors
-
Boston, MA, USA
-
Vasiliadis G, Antonatos S, Polychronakis M, Markatos EP, Ioannidis S, Gnort: high performance network intrusion detection using graphics processors, In: 11th international symposium on recent advances in intrusion detection, Boston, MA, USA, 2008, pp. 116-134.
-
(2008)
11th International Symposium on Recent Advances in Intrusion Detection
, pp. 116-134
-
-
Vasiliadis, G.1
Antonatos, S.2
Polychronakis, M.3
Markatos, E.P.4
Ioannidis, S.5
-
70
-
-
80052033497
-
An integrated intrusion detection system for cluster-based wireless sensor networks
-
SS Wang, KQ Yan, SC Wang, and CW Liu An integrated intrusion detection system for cluster-based wireless sensor networks Expert Systems with Applications 38 2011 15234 15243
-
(2011)
Expert Systems with Applications
, vol.38
, pp. 15234-15243
-
-
Wang, S.S.1
Yan, K.Q.2
Wang, S.C.3
Liu, C.W.4
-
72
-
-
79251595976
-
A comparative evaluation of intrusion detection architectures for mobile ad hoc networks
-
C Xenakis, C Panos, and I Stavrakakis A comparative evaluation of intrusion detection architectures for mobile ad hoc networks Computers & Security 30 2011 63 80
-
(2011)
Computers & Security
, vol.30
, pp. 63-80
-
-
Xenakis, C.1
Panos, C.2
Stavrakakis, I.3
-
73
-
-
78650529700
-
VMDriver: A driver-based monitoring mechanism for virtualization
-
New Delhi
-
Xiang G, Jin H, Zou D, Zhang X, Wen S, Zhao F, VMDriver: a driver-based monitoring mechanism for virtualization, In: 29th IEEE symposium on reliable distributed systems, New Delhi, 2010, pp. 72-81.
-
(2010)
29th IEEE Symposium on Reliable Distributed Systems
, pp. 72-81
-
-
Xiang, G.1
Jin, H.2
Zou, D.3
Zhang, X.4
Wen, S.5
Zhao, F.6
-
75
-
-
73549100005
-
The application of virtual machines on system security
-
Yantai, Shandong
-
Zhao S, Chen K, Zheng W, The application of virtual machines on system security. In: Fourth ChinaGrid annual conference, Yantai, Shandong, 2009, pp. 222-229.
-
(2009)
Fourth ChinaGrid Annual Conference
, pp. 222-229
-
-
Zhao, S.1
Chen, K.2
Zheng, W.3
|