-
1
-
-
33646423315
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
May
-
V. A. Siris and F. Papagalou, Application of anomaly detection algorithms for detecting SYN flooding attacks, J. Computer Commun., vol. 29, no. 9, pp. 1433-1442, May 2009.
-
(2009)
J. Computer Commun.
, vol.29
, Issue.9
, pp. 1433-1442
-
-
Siris, V.A.1
Papagalou, F.2
-
2
-
-
84859820888
-
A MAC layer based defence architecture for reductionin-quality (RoQ) attacks in wireless LAN
-
Jan.
-
J. Singh, et al., A MAC layer based defence architecture for reductionin-quality (RoQ) attacks in wireless LAN, Int'l J. Computer Science and Inf. Security, vol. 7, no. 1, pp. 284-291, Jan. 2010.
-
(2010)
Int'l J. Computer Science and Inf. Security
, vol.7
, Issue.1
, pp. 284-291
-
-
Singh, J.1
-
3
-
-
77954310491
-
Impact of feature reduction on the efficiency of wireless intrusion detection systems
-
Aug.
-
K. El-Khatib, Impact of feature reduction on the efficiency of wireless intrusion detection systems, IEEE Trans. Parallel and Distrib. Syst., vol. 21, no. 8, pp. 1143-1149, Aug. 2010.
-
(2010)
IEEE Trans. Parallel and Distrib. Syst.
, vol.21
, Issue.8
, pp. 1143-1149
-
-
El-Khatib, K.1
-
4
-
-
79960403099
-
Category-based selection of effective parameters for intrusion detection
-
Sept.
-
P. B. Zargar and G. R. A. Kabiri, Category-based selection of effective parameters for intrusion detection, Int'l J. Computer Science and Network Security, vol. 9, no. 9, Sept. 2009.
-
(2009)
Int'l J. Computer Science and Network Security
, vol.9
, Issue.9
-
-
Zargar, P.B.1
Kabiri, G.R.A.2
-
6
-
-
70349107731
-
Passice data link layer 802.11 wireless device driver fingerprinting
-
J. Franklin, et al., Passice data link layer 802.11 wireless device driver fingerprinting, in Proc. 2006 USENIX Security Symposium, pp. 1-12.
-
Proc. 2006 USENIX Security Symposium
, pp. 1-12
-
-
Franklin, J.1
-
8
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
F. Valeur, et al., A comprehensive approach to intrusion detection alert correlation, IEEE Trans. Dependable and Secure Computing, vol. 1, no. 3, pp. 146-169, 2004.
-
(2004)
IEEE Trans. Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
-
10
-
-
40649085584
-
Feature ranking and selection for intrusion detection using artificial neural networks and statistical methods
-
A. Tamilarasan, et al., Feature ranking and selection for intrusion detection using artificial neural networks and statistical methods, in Proc. 2006 International Joint Conference on Neural Networks, pp. 4754-4761.
-
Proc. 2006 International Joint Conference on Neural Networks
, pp. 4754-4761
-
-
Tamilarasan, A.1
-
11
-
-
84880171226
-
The effect of probe interval estimation on attack detection performance of a WLAN independent intrusion detection system
-
J. Milliken, et al., The effect of probe interval estimation on attack detection performance of a WLAN independent intrusion detection system, in Proc. 2012 IET Intl. Conf. on Wireless Communications and Applications.
-
Proc. 2012 IET Intl. Conf. on Wireless Communications and Applications
-
-
Milliken, J.1
|