-
1
-
-
84902184168
-
Minimizing public cloud disruptions
-
TechTarget, [online]. Available at
-
Perry, G., Minimizing public cloud disruptions, TechTarget, [online]. Available at: http://searchdatacenter.techtarget.com/tip/Minimizing-public-cloud-disruptions, 2011.
-
(2011)
-
-
Perry, G.1
-
2
-
-
77950559014
-
Intrusion Detection in the Cloud
-
Autonomic and Secure Computing
-
Roschke, S., Cheng, F. and Meinel, C., Intrusion Detection in the Cloud. In Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 729-734, 2009.
-
(2009)
In Eighth IEEE International Conference on Dependable
, pp. 729-734
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
3
-
-
35048852163
-
A Novel Framework for Alert Correlation and Understanding
-
International Conference on Applied Cryptography and Network Security (ACNS) 2004, Springer's LNCS series, 3089
-
Yu, D. and Frincke, D., A Novel Framework for Alert Correlation and Understanding. International Conference on Applied Cryptography and Network Security (ACNS) 2004, Springer's LNCS series, 3089, pp. 452-466, 2004.
-
(2004)
, pp. 452-466
-
-
Yu, D.1
Frincke, D.2
-
4
-
-
79955677448
-
Multi-level Intrusion Detection System and Log Management in Cloud Computing
-
In 13th International Conference on Advanced Communication Technology (ICACT) ICACT 2011, Seoul, 13-16 February
-
Lee, J-H., Park, M-W., Eom, J-H. And Chung, T-M., Multi-level Intrusion Detection System and Log Management in Cloud Computing. In 13th International Conference on Advanced Communication Technology (ICACT) ICACT 2011, Seoul, 13-16 February, pp.552-555, 2011.
-
(2011)
, pp. 552-555
-
-
Lee, J.-H.1
Park, M.-W.2
Eom, J.-H.3
Chung, T.-M.4
-
5
-
-
78049486291
-
Dempster-Shafer for Anomaly Detection
-
Las Vegas, USA
-
Chen, Q. and Aickelin, U., Dempster-Shafer for Anomaly Detection. In Proceedings of the International Conference on Data Mining (DMIN 2006), Las Vegas, USA, pp. 232-238, 2006.
-
(2006)
In Proceedings of the International Conference on Data Mining (DMIN 2006)
, pp. 232-238
-
-
Chen, Q.1
Aickelin, U.2
-
6
-
-
33847789179
-
A novel approach for a Distributed Denial of Service Detection Engine
-
National Technical University of Athens. Athens, Greece
-
Siaterlis, C., Maglaris, B. and Roris, P., A novel approach for a Distributed Denial of Service Detection Engine. National Technical University of Athens. Athens, Greece, 2003.
-
(2003)
-
-
Siaterlis, C.1
Maglaris, B.2
Roris, P.3
-
7
-
-
28844473551
-
One step ahead to Multisensor Data Fusion for DDoS Detection
-
Siaterlis, C. And Maglaris, B., One step ahead to Multisensor Data Fusion for DDoS Detection. Journal of Computer Security, 13(5): 779-806, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.5
, pp. 779-806
-
-
Siaterlis, C.1
Maglaris, B.2
-
8
-
-
0026370874
-
A Probabilistic Foundation for Vagueness & Imprecision in Fault-Tree Analysis
-
Guth, M.A.S., A Probabilistic Foundation for Vagueness & Imprecision in Fault-Tree Analysis. IEEE Transactions on Reliability, 40(5), pp.563-569, 1991.
-
(1991)
IEEE Transactions on Reliability
, vol.40
, Issue.5
, pp. 563-569
-
-
Guth, M.A.S.1
-
9
-
-
77957806544
-
Some Aspects about Vagueness & Imprecision in Computer Network Fault-Tree Analysis
-
ISSN: 1841-9836
-
Popescu D.E., Lonea A.M., Zmaranda D.,Vancea C. and Tiurbe C., Some Aspects about Vagueness & Imprecision in Computer Network Fault-Tree Analysis. INT J COMPUT COMMUN, ISSN: 1841-9836, 5(4): 558-566, 2010.
-
(2010)
INT J COMPUT COMMUN
, vol.5
, Issue.4
, pp. 558-566
-
-
Popescu, D.E.1
Lonea, A.M.2
Zmaranda, D.3
Vancea, C.4
Tiurbe, C.5
-
10
-
-
84902191057
-
Dempster-Shafer Theory and Network Intrusion Detection Systems
-
Sharif University of Technology
-
Esmaili, M., Dempster-Shafer Theory and Network Intrusion Detection Systems. Scientia Iranica, Vol. 3, No. 4, Sharif University of Technology, 1997.
-
(1997)
Scientia Iranica
, vol.3
, Issue.4
-
-
Esmaili, M.1
-
11
-
-
0041675012
-
Combination of Evidence in Dempster-Shafer Theory
-
Sandia National Laboratories, Sandia Report
-
Sentz, K. and Ferson, S., Combination of Evidence in Dempster-Shafer Theory. Sandia National Laboratories, Sandia Report, 2002.
-
(2002)
-
-
Sentz, K.1
Ferson, S.2
-
12
-
-
84902207247
-
Intrusion Detection Using the Dempster-Shafer Theory
-
Literature Review and Survey, School of Computer Science, University of Windsor
-
Dissanayake, A., Intrusion Detection Using the Dempster-Shafer Theory. 60-510 Literature Review and Survey, School of Computer Science, University of Windsor, 2008.
-
(2008)
, pp. 60-510
-
-
Dissanayake, A.1
-
13
-
-
78349296456
-
Integrating a Network IDS into an Open Source Cloud Computing Environment
-
In Sixth International Conference on Information Assurance and Security
-
Mazzariello, C., Bifulco, R. and Canonico, R., Integrating a Network IDS into an Open Source Cloud Computing Environment. In Sixth International Conference on Information Assurance and Security, pp. 265-270, 2010.
-
(2010)
, pp. 265-270
-
-
Mazzariello, C.1
Bifulco, R.2
Canonico, R.3
-
14
-
-
79958729447
-
Intrusion Detection System in Cloud Computing Environment
-
In International Conference and Workshop on Emerging Trends in Technology (ICWET 2011) ' TCET, Mumbai, India
-
Dhage, S. N., et al., Intrusion Detection System in Cloud Computing Environment. In International Conference and Workshop on Emerging Trends in Technology (ICWET 2011) ' TCET, Mumbai, India, pp. 235-239, 2011.
-
(2011)
, pp. 235-239
-
-
Dhage, S.N.1
-
15
-
-
78649815408
-
A Cooperative Intrusion Detection System Framework for Cloud Computing Networks
-
In 39th International Conference on Parallel Processing Workshops
-
Lo, C-C. , Huang, C-C. And Ku, J., A Cooperative Intrusion Detection System Framework for Cloud Computing Networks. In 39th International Conference on Parallel Processing Workshops, pp.280-284, 2010.
-
(2010)
, pp. 280-284
-
-
Lo, C.-C.1
Huang, C.-C.2
Ku, J.3
-
16
-
-
67349127851
-
Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster-Shafer Theory
-
ACM-SE 43:
-
Yu, D. and Frincke, D., Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster-Shafer Theory. ACM-SE 43: Proceedings of the 43rd ACM Southeast Conference, pp. 142-147, 2005.
-
(2005)
Proceedings of the 43rd ACM Southeast Conference
, pp. 142-147
-
-
Yu, D.1
Frincke, D.2
-
17
-
-
63749120226
-
Network intrusion detection design using feature selection of soft computing paradigms
-
Chou, T., Yen, K.K., Luo, J., Network intrusion detection design using feature selection of soft computing paradigms. International Journal of Computational Intelligence, 4(3): 102-105, 2008.
-
(2008)
International Journal of Computational Intelligence
, vol.4
, Issue.3
, pp. 102-105
-
-
Chou, T.1
Yen, K.K.2
Luo, J.3
-
19
-
-
39749091030
-
Intrusion Detection Engine Based on Dempster-Shafer's Theory of Evidence
-
2006 International Conference
-
Hu, W., Li, J. and Gao, Q., Intrusion Detection Engine Based on Dempster-Shafer's Theory of Evidence. Communications, Circuits and Systems Proceedings, 2006 International Conference, 3: 1627-1631, 2006.
-
(2006)
Communications, Circuits and Systems Proceedings
, vol.3
, pp. 1627-1631
-
-
Hu, W.1
Li, J.2
Gao, Q.3
|