-
6
-
-
84886418709
-
-
National Australia Bank it by DDoS Attack, 2009 http://www.zdnet.com.au/ news/security/soa/National-Australia-Bank-hit-by-DDoS-attack/0,130061744, 339271790,00.htm
-
(2009)
National Australia Bank It by DDoS Attack
-
-
-
10
-
-
84884824368
-
-
European Anti Fraud Office
-
European Anti Fraud Office, 2011 http://ec.europa.eu/anti-fraud/index-it. html
-
(2011)
-
-
-
11
-
-
46149120818
-
Forensic analysis for epidemic attacks in federated networks
-
IEEE
-
Y. Xie, V. Sekar, M.K. Reiter, H. Zhang, Forensic analysis for epidemic attacks in federated networks, in: Proceedings of the 14th International Conference on Network Protocols, IEEE, 2006, pp. 43-53.
-
(2006)
Proceedings of the 14th International Conference on Network Protocols
, pp. 43-53
-
-
Xie, Y.1
Sekar, V.2
Reiter, M.K.3
Zhang, H.4
-
12
-
-
77649232304
-
Cooperative detection and protection against network attacks using decentralized information sharing
-
Kluwer Academic Publishers
-
G. Zhang, M. Parashar, Cooperative detection and protection against network attacks using decentralized information sharing, in: Cluster Computing, vol. 13, Kluwer Academic Publishers, 2010, pp. 67-86.
-
(2010)
Cluster Computing
, vol.13
, pp. 67-86
-
-
Zhang, G.1
Parashar, M.2
-
14
-
-
2542514777
-
Amit - The situation manager
-
DOI 10.1007/s00778-003-0108-y
-
A. Adi, O. Etzion, Amit - the situation manager, The VLDB Journal 13 (2004) 177-203 (Springer-Verlag). (Pubitemid 38700768)
-
(2004)
VLDB Journal
, vol.13
, Issue.2
, pp. 177-203
-
-
Adi, A.1
Etzion, O.2
-
15
-
-
33947664000
-
Adaptive control of extreme-scale stream processing systems
-
IEEE
-
L. Amini, N. Jain, A. Sehgal, J. Silber, O. Verscheure, Adaptive control of extreme-scale stream processing systems, in: Proceedings of the 26th International Conference on Distributed Computing Systems, IEEE, 2006, p. 71.
-
(2006)
Proceedings of the 26th International Conference on Distributed Computing Systems
, pp. 71
-
-
Amini, L.1
Jain, N.2
Sehgal, A.3
Silber, J.4
Verscheure, O.5
-
16
-
-
74049113739
-
Implementing a high-volume, low-latency market data processing system on commodity hardware using IBM middleware
-
ACM
-
X.J. Zhang, H. Andrade, B. Gedik, R. King, J. Morar, S. Nathan, Y. Park, R. Pavuluri, E. Pring, R. Schnier, P. Selo, M. Spicer, V. Uhlig, C. Venkatramani, Implementing a high-volume, low-latency market data processing system on commodity hardware using IBM middleware, in: Proceedings of the 2nd Workshop on High Performance Computational Finance, ACM, 2009, pp. 7:1-7:8.
-
(2009)
Proceedings of the 2nd Workshop on High Performance Computational Finance
, pp. 71-78
-
-
Zhang, X.J.1
Andrade, H.2
Gedik, B.3
King, R.4
Morar, J.5
Nathan, S.6
Park, Y.7
Pavuluri, R.8
Pring, E.9
Schnier, R.10
Selo, P.11
Spicer, M.12
Uhlig, V.13
Venkatramani, C.14
-
17
-
-
84859182421
-
Plan-based complex event detection across distributed sources
-
VLDB Endowment
-
M. Akdere, U. Çetintemel, N. Tatbul, Plan-based complex event detection across distributed sources, in: Proceedings of the VLDB Endowment, vol. 1, VLDB Endowment, 2008, pp. 66-77.
-
(2008)
Proceedings of the VLDB Endowment
, vol.1
, pp. 66-77
-
-
Akdere, M.1
-
19
-
-
78650039675
-
-
JBoss Drools Fusion, 2010 http://www.jboss.org/drools/drools-fusion.html
-
(2010)
JBoss Drools Fusion
-
-
-
20
-
-
36348978761
-
Diagnosing network disruptions with network-wide analysis
-
DOI 10.1145/1269899.1254890, SIGMETRICS'07 - Proceedings of the 2007 International Conference on Measurement and Modeling of Computer Systems
-
Y. Huang, N. Feamser, A. Lakhina, J.J. Xu, Diagnosing network disruptions with network-wide analysis, in: Proceedings of the International Conference on Measurement and Modeling of Computer Systems, ACM, 2007, pp. 61-72. (Pubitemid 350158073)
-
(2007)
Performance Evaluation Review
, vol.35
, Issue.1
, pp. 61-72
-
-
Huang, Y.1
Feamster, N.2
Lakhina, A.3
Xu, J.4
-
24
-
-
33745469273
-
Towards collaborative security and p2p intrusion detection
-
IEEE
-
M.E. Locasto, J.J. Parekh, A.D. Keromytis, S.J. Stolfo, Towards collaborative security and p2p intrusion detection, in: Proceedings of the Information Assurance Workshop, IEEE, 2005, pp. 30-36.
-
(2005)
Proceedings of the Information Assurance Workshop
, pp. 30-36
-
-
Locasto, M.E.1
Parekh, J.J.2
Keromytis, A.D.3
Stolfo, S.J.4
-
25
-
-
78649834860
-
A contract-based event driven model for collaborative security in financial information systems
-
SciTePress
-
R. Baldoni, G. Lodi, G. Chockler, E. Dekel, B.P. Mulcahy, G. Martufi, A contract-based event driven model for collaborative security in financial information systems, in: Proceedings of the 12th International Conference on Enterprise Information Systems, vol. 4, SciTePress, 2010, pp. 147-152.
-
(2010)
Proceedings of the 12th International Conference on Enterprise Information Systems
, vol.4
, pp. 147-152
-
-
Baldoni, R.1
Lodi, G.2
Chockler, G.3
Dekel, E.4
Mulcahy, B.P.5
Martufi, G.6
-
26
-
-
33847258726
-
A peer-to-peer collaborative intrusion detection system
-
IEEE
-
C.V. Zhou, S. Karunasekera, C. Leckie, A peer-to-peer collaborative intrusion detection system, in: Proceedings of the 13th International Conference on Networks, vol. 1, IEEE, 2005, pp. 118-123.
-
(2005)
Proceedings of the 13th International Conference on Networks
, vol.1
, pp. 118-123
-
-
Zhou, C.V.1
Karunasekera, S.2
Leckie, C.3
-
27
-
-
77956701463
-
Intrusion detections in collaborative organizations by preserving privacy
-
Springer
-
N. Verma, F. Trousset, P. Poncelet, F. Masseglia, Intrusion detections in collaborative organizations by preserving privacy, in: Advances in Knowledge Discovery and Management, Springer, 2009, pp. 235-247.
-
(2009)
Advances in Knowledge Discovery and Management
, pp. 235-247
-
-
Verma, N.1
Trousset, F.2
Poncelet, P.3
Masseglia, F.4
-
28
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
(Elsevier)
-
C.V. Zhou, C. Leckie, and S. Karunasekera A survey of coordinated attacks and collaborative intrusion detection Computers & Security 29 2010 124 140 (Elsevier)
-
(2010)
Computers & Security
, vol.29
, pp. 124-140
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
-
29
-
-
85030321143
-
MapReduce: Simplified data processing on large clusters
-
USENIX Association
-
D. Jeffrey, S. Ghemawat, MapReduce: simplified data processing on large clusters, in: Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation, USENIX Association, vol. 6, 2004, pp. 137-149.
-
(2004)
Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation
, vol.6
, pp. 137-149
-
-
Jeffrey, D.1
Ghemawat, S.2
-
30
-
-
84945193907
-
SLAng: A language for defining service level agreements
-
IEEE
-
D. Lamanna, J. Skene, W. Emmerich, SLAng: a language for defining service level agreements, in: Proceedings of the 9th IEEE Workshop on Future Trends of Distributed Computing Systems, IEEE, 2003, p. 100.
-
(2003)
Proceedings of the 9th IEEE Workshop on Future Trends of Distributed Computing Systems
, pp. 100
-
-
Lamanna, D.1
Skene, J.2
Emmerich, W.3
-
31
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
IEEE
-
J. Jung, V. Paxson, A.W. Berger, H. Balakrishnan, Fast portscan detection using sequential hypothesis testing, in: Proceedings of the Symposium on Security and Privacy, IEEE, 2004, pp. 211-225.
-
(2004)
Proceedings of the Symposium on Security and Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
33
-
-
74949144104
-
Tcp portscan detection based on single packet flows and entropy
-
ACM
-
W.G. Hai Zhang, Xuyang Zhu, Tcp portscan detection based on single packet flows and entropy, in: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, ACM, 2009, pp. 1056-1060.
-
(2009)
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
, pp. 1056-1060
-
-
Hai Zhang, W.G.1
Zhu, X.2
-
35
-
-
79958741784
-
Inter-domain stealthy port scan detection through complex event processing
-
ACM
-
L. Aniello, G. Lodi, R. Baldoni, Inter-domain stealthy port scan detection through complex event processing, in: Proceedings of the 13th European Workshop on Dependable Computing, ACM, 2011, pp. 67-72.
-
(2011)
Proceedings of the 13th European Workshop on Dependable Computing
, pp. 67-72
-
-
Aniello, L.1
Lodi, G.2
Baldoni, R.3
-
36
-
-
80052991883
-
A collaborative event processing system for protection of critical infrastructures from cyber attacks
-
Springer-Verlag
-
L. Aniello, G.A. Di Luna, R. Baldoni, A collaborative event processing system for protection of critical infrastructures from cyber attacks, in: Proceedings of the 30th Conference on System Safety, Reliability and Security, Springer-Verlag, 2011, pp. 310-323.
-
(2011)
Proceedings of the 30th Conference on System Safety, Reliability and Security
, pp. 310-323
-
-
Aniello, L.1
Di Luna, G.A.2
Baldoni, R.3
-
41
-
-
34748814488
-
Evaluation of a decentralized architecture for large scale collaborative intrusion detection
-
DOI 10.1109/INM.2007.374772, 4258524, 10th IFIP/IEEE International Symposium on Integrated Network Management 2007, IM '07
-
C. Zhou, S. Karunasekera, C. Leckie, Evaluation of a decentralized architecture for large scale collaborative intrusion detection, in: Proceedings of the 10th International Symposium on Integrated Network Management, IEEE, 2007, pp. 80-89. (Pubitemid 47485161)
-
(2007)
10th IFIP/IEEE International Symposium on Integrated Network Management 2007, IM '07
, pp. 80-89
-
-
Zhou, C.V.1
Karunasekera, S.2
Leckie, C.3
-
42
-
-
84884824752
-
-
Dipartimento del Tesoro - Anti Fraud System
-
Dipartimento del Tesoro - Anti Fraud System, 2011 http://www.dt.tesoro. it/en/antifrode-mezzi-pagamento/
-
(2011)
-
-
-
43
-
-
55649105542
-
SPADE: The System S declarative stream processing engine
-
ACM
-
Bugra Gedik, Henrique Andrade, Kun-Lung Wu, Philip S. Yu, Myungcheol Doo, SPADE: the System S declarative stream processing engine, in: Proceedings of the International Conference on Management of Data, ACM, 2008, pp. 1123-1134.
-
(2008)
Proceedings of the International Conference on Management of Data
, pp. 1123-1134
-
-
Gedik, B.1
Andrade, H.2
Wu, K.3
Yu, P.S.4
Doo, M.5
-
45
-
-
33745160750
-
Privacy-preserving set operations
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
L. Kissner, D. Song, Privacy-preserving set operations, in: Proceedings of the 25th Annual International Cryptology Conference, Springer, 2005, pp. 241-257. (Pubitemid 43902117)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621 LNCS
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
46
-
-
84868292922
-
Oblivious assignment with m-slot
-
Springer-Verlag
-
G. Ateniese, R. Baldoni, S. Bonomi, G. Di Luna, Oblivious assignment with m-slot, in: Proceedings of the 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Springer-Verlag, 2012, pp. 187-201.
-
(2012)
Proceedings of the 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems
, pp. 187-201
-
-
Ateniese, G.1
Baldoni, R.2
Bonomi, S.3
Di Luna, G.4
-
47
-
-
20444507015
-
Universal re-encryption for mixnets
-
Springer-Verlag
-
P. Golle, M. Jakobsson, A. Juels, P. Syverson, Universal re-encryption for mixnets, in: Proceedings of the RSA Conference, Cryptographers track, Springer-Verlag, 2002, pp. 163-178.
-
(2002)
Proceedings of the RSA Conference, Cryptographers Track
, pp. 163-178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
48
-
-
77955452807
-
Collaborative, privacy-preserving data aggregation at scale
-
Springer-Verlag
-
B. Applebaum, H. Ringberg, M. J. Freedman, M. Caesar, J. Rexford, Collaborative, privacy-preserving data aggregation at scale, in: Proceedings of the 10th International Conference on Privacy Enhancing Technologies, Springer-Verlag, 2010, pp. 56-74.
-
(2010)
Proceedings of the 10th International Conference on Privacy Enhancing Technologies
, pp. 56-74
-
-
Applebaum, B.1
Ringberg, H.2
Freedman, M.J.3
Caesar, M.4
Rexford, J.5
-
49
-
-
57049188348
-
Sharemind: A framework for fast privacy-preserving computations
-
Springer
-
D. Bogdanov, S. Laur, J. Willemson, Sharemind: a framework for fast privacy-preserving computations, in: Proceedings of the 13th European Symposium on Research in Computer Security, Springer, 2008, pp. 192-206.
-
(2008)
Proceedings of the 13th European Symposium on Research in Computer Security
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
50
-
-
85084163840
-
Fairplay: A secure two-party computation system
-
ACM
-
N. Nisan, B. Pinkas, Y. Sella, Fairplay: a secure two-party computation system, in: Proceedings of the 13th Conference on USENIX Security Symposium, vol. 13, ACM, 2004, p. 20.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, vol.13
, pp. 20
-
-
Nisan, N.1
Pinkas, B.2
Sella, Y.3
-
54
-
-
84881177989
-
Adaptive online scheduling in storm
-
ACM
-
L. Aniello, R. Baldoni, L. Querzoni, Adaptive online scheduling in storm, in: Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems, ACM, 2013, pp. 207-218.
-
(2013)
Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems
, pp. 207-218
-
-
Aniello, L.1
Baldoni, R.2
Querzoni, L.3
-
55
-
-
7444225924
-
Secure Association Rule Sharing
-
Advances in Knowledge Discovery and Data Mining
-
S.R.M. Oliveira, O.R. Zaiane, Y. Saygin, Secure association rule sharing, in: Proceedings of the 8th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, Springer, Berlin, Heidelberg, 2004, pp. 74-85. (Pubitemid 38824885)
-
(2004)
Lecture notes in computer science
, Issue.3056
, pp. 74-85
-
-
Oliveira, S.R.M.1
Zaiane, O.R.2
Saygin, Y.3
-
56
-
-
0344990562
-
Using unknowns to prevent discovery of association rules
-
Y. Saygin, V.S. Verykios, C. Clifton, Using unknowns to prevent discovery of association rules, in: SIGMOD Record, ACM, 2001, pp. 45-54. (Pubitemid 33720998)
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 45-54
-
-
Saygin, Y.1
Verykios, V.S.2
Clifton, C.3
-
57
-
-
84963903295
-
Parsimonious downgrading and decision trees applied to the inference problem
-
ACM
-
L. Chang, I.S. Moskowitz, Parsimonious downgrading and decision trees applied to the inference problem, in: Proceedings of the Workshop on New Security Paradigms, vol. 30, ACM, 1998, pp. 82-89.
-
(1998)
Proceedings of the Workshop on New Security Paradigms
, vol.30
, pp. 82-89
-
-
Chang, L.1
Moskowitz, I.S.2
-
59
-
-
0018444418
-
Secure databases: Protection against user influence
-
DOI 10.1145/320064.320068
-
D. Dobkin, A.K. Jones, R.J. Lipton, Secure databases: protection against user influence, in: Transactions on Database Systems, ACM, 1979, pp. 97-106. (Pubitemid 9437765)
-
(1979)
ACM Transactions on Database Systems
, vol.4
, Issue.1
, pp. 97-106
-
-
Dobkin David1
Jones Anita, K.2
Lipton Richard, J.3
-
60
-
-
33244455692
-
Simulatable auditing
-
DOI 10.1145/1065167.1065183, Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2005
-
K. Kenthapadi, N. Mishra, K. Nissim, Simulatable auditing, in: Proceedings of the 24th SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, ACM, 2005, pp. 118-127. (Pubitemid 43275475)
-
(2005)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 118-127
-
-
Kenthapadi, K.1
Mishra, N.2
Nissim, K.3
-
63
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
P. Samarati, Protecting respondents' identities in microdata release, in: Transactions on Knowledge and Data Engineering, IEEE, 2001, pp. 1010-1027. (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
64
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
ACM
-
A. Machanavajjhala, D. Kifer, J. Gehrke, M. Venkitasubramaniam, L-diversity: privacy beyond k-anonymity, in: Transactions on Knowledge Discovery from Data, ACM, 2007, p. 24.
-
(2007)
Transactions on Knowledge Discovery from Data
, pp. 24
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
65
-
-
63449120127
-
On variable constraints in privacy preserving data mining
-
C.C. Aggarwal, P.S. Yu, On variable constraints in privacy preserving data mining, in: Proceedings of the 5th International Conference on Data Mining, SIAM, 2005, pp. 115-125.
-
(2005)
Proceedings of the 5th International Conference on Data Mining, SIAM
, pp. 115-125
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
66
-
-
84955726089
-
-
R. Baldoni, G. Chockler (Eds) "Collaborative Financial Infrastructure Protection", Springer
-
L. Aniello, R. Baldoni, G. Chockler, G. Laventman, G. Lodi, Y. Vigfusson, "Distributed Attack Detection Using Agilis" in R. Baldoni, G. Chockler (Eds) "Collaborative Financial Infrastructure Protection", Springer, pp. 157-174, 2012.
-
(2012)
Distributed Attack Detection Using Agilis
, pp. 157-174
-
-
Aniello, L.1
Baldoni, R.2
Chockler, G.3
Laventman, G.4
Lodi, G.5
Vigfusson, Y.6
|