-
1
-
-
78650268348
-
Evaluating intrusion detection approaches using multi-criteria decision making technique
-
Iftikhar Ahmad, Azween B. Abdullah, and Abdullah S. Alghamdi Evaluating intrusion detection approaches using multi-criteria decision making technique Int. J. Inform. Sci. Comput. Eng. 1 1 2010 60 67
-
(2010)
Int. J. Inform. Sci. Comput. Eng.
, vol.1
, Issue.1
, pp. 60-67
-
-
Ahmad, I.1
Abdullah, A.B.2
Alghamdi, A.S.3
-
2
-
-
78951473333
-
Towards the selection of best neural network system for intrusion detection
-
(4 October, 2010)
-
Iftikhar Ahmad, Azween B. Abdullah, and Abdullah S. Alghamdi Towards the selection of best neural network system for intrusion detection Int. J. Phys. Sci. 5 12 2010 1830 1839 (4 October, 2010)
-
(2010)
Int. J. Phys. Sci.
, vol.5
, Issue.12
, pp. 1830-1839
-
-
Ahmad, I.1
Abdullah, A.B.2
Alghamdi, A.S.3
-
4
-
-
35248836533
-
Using specification-based intrusion detection for automated response
-
September
-
I. Balepin, S. Maltsev, J. Rowe, K.N. Levitt, Using specification-based intrusion detection for automated response, in: Proceedings of the 6th Int'l Symp on Recent advances in Intrusion Detection (RAID 2003), September 2003, pp. 136-154.
-
(2003)
Proceedings of the 6th Int'l Symp on Recent Advances in Intrusion Detection (RAID 2003)
, pp. 136-154
-
-
Balepin, I.1
Maltsev, S.2
Rowe, J.3
Levitt, K.N.4
-
5
-
-
0023817930
-
Sensitivity analysis of additive multiattribute value models
-
H. Barron, and C.P. Schmidt Sensitivity analysis of additive multiattribute value models Oper. Res. 36 1 1988 122 127 (Pubitemid 18621601)
-
(1988)
Operations Research
, vol.36
, Issue.1
, pp. 122-127
-
-
Barron Hutton1
Schmidt Charles, P.2
-
6
-
-
0346636333
-
Decision making in a fuzzy environment
-
R.E. Bellman, and L.A. Zadeh Decision making in a fuzzy environment Manage. Sci. 17 1970 8 9
-
(1970)
Manage. Sci.
, vol.17
, pp. 8-9
-
-
Bellman, R.E.1
Zadeh, L.A.2
-
7
-
-
0005330416
-
Multi-attribute risk assessment
-
Raleigh, NC, December
-
S.A. Butler, P. Fishbeck, Multi-attribute risk assessment, in: Cmu-cs-01-169, Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS' 02), Raleigh, NC, December 2001.
-
(2001)
Cmu-cs-01-169, Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS' 02)
-
-
Butler, S.A.1
Fishbeck, P.2
-
8
-
-
0345477912
-
A methodology for using intelligent agents to provide automated intrusion response
-
West Point, NY, June 6-7
-
C.A. Carver, J.M.D. Hill, John R. Surdu, U.W. Pooch, A methodology for using intelligent agents to provide automated intrusion response, in: Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, June 6-7, 2000, pp. 110-116.
-
(2000)
Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop
, pp. 110-116
-
-
Carver, C.A.1
Hill, J.M.D.2
Surdu, J.R.3
Pooch, U.W.4
-
9
-
-
0026268616
-
Integrated multi-criteria evaluation with geographical information systems
-
S.J. Carver Integrated multi-criteria evaluation with geographical information systems Int. J. Geograph. Inform. Syst. 5 3 1991 321 339
-
(1991)
Int. J. Geograph. Inform. Syst.
, vol.5
, Issue.3
, pp. 321-339
-
-
Carver, S.J.1
-
11
-
-
84955591263
-
An Intelligent Decision Support System for Intrusion Detection and Response
-
Information Assurance in Computer Networks Methods, Models and Architectures for Network Security
-
D. Dasgupta, F.A. Gonzalez, An intelligent decision support system for intrusion detection and response, in: LNCS (Ed.), Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security (MMM-ACNS 2001), vol. 2052, 2001, pp. 1-14. (Pubitemid 33275958)
-
(2001)
Lecture Notes In Computer Science
, Issue.2052
, pp. 1-14
-
-
Dasgupta, D.1
Gonzalez, F.A.2
-
12
-
-
72149105069
-
Multi-attribute decision analysis in GIS: Weighted linear combination and ordered weighted averaging
-
S. Drobne, and A. Lisec Multi-attribute decision analysis in GIS: weighted linear combination and ordered weighted averaging Informatica 33 2009 459 474
-
(2009)
Informatica
, vol.33
, pp. 459-474
-
-
Drobne, S.1
Lisec, A.2
-
13
-
-
84900140671
-
A reliable phased network topology design using evolutionary algorithm
-
Shah Alam, Malaysia
-
S. Elhaggaz, M. Ghassempoory, J. Brown, A reliable phased network topology design using evolutionary algorithm, in: 2002 Student Conference on Research and Development Proceedings, Shah Alam, Malaysia, 2002.
-
(2002)
2002 Student Conference on Research and Development Proceedings
-
-
Elhaggaz, S.1
Ghassempoory, M.2
Brown, J.3
-
14
-
-
18944395437
-
A distributed intrusion detection and response system based on mobile autonomous agents using social insects communication paradigm
-
S. Fenet, and S. Hassas A distributed intrusion detection and response system based on mobile autonomous agents using social insects communication paradigm Electron. Notes Theor. Comput. Sci. 63 2001 5 9
-
(2001)
Electron. Notes Theor. Comput. Sci.
, vol.63
, pp. 5-9
-
-
Fenet, S.1
Hassas, S.2
-
15
-
-
70449587429
-
A new genetic algorithm approach for intrusion response system in computer networks
-
Sousse, July 5-8
-
B.A. Fessi, S. Benabdallah, M. Hamdi, N. Boudriga, A new genetic algorithm approach for intrusion response system in computer networks, in: The 14th IEEE Symposium on Computers and Communications (ISCC'09), Sousse, July 5-8, 2009, pp. 342-347.
-
(2009)
The 14th IEEE Symposium on Computers and Communications (ISCC'09)
, pp. 342-347
-
-
Fessi, B.A.1
Benabdallah, S.2
Hamdi, M.3
Boudriga, N.4
-
16
-
-
33750736286
-
A decisional framework system for computer network intrusion detection
-
DOI 10.1016/j.ejor.2005.10.020, PII S0377221705006533
-
B.A. Fessi, M. Hamdi, S. Benabdallah, and N. Boudriga A decisional framework system for computer network intrusion detection Eur. J. Oper. Res. 177 3 2007 1824 1838 March (Pubitemid 44709447)
-
(2007)
European Journal of Operational Research
, vol.177
, Issue.3
, pp. 1824-1838
-
-
Fessi, B.A.1
Hamdi, M.2
Benabdallah, S.3
Boudriga, N.4
-
17
-
-
65749098543
-
Introduction to decision- making methods
-
The Evergreen State College, Olympia, Washington, December 13-15 2005
-
J. Fülöp, Introduction to decision- making methods, in: Paper Developed for the BDEI-3 Workshop, The Evergreen State College, Olympia, Washington, December 13-15, 2004, 2005.
-
(2004)
Paper Developed for the BDEI-3 Workshop
-
-
Fülö1
-
18
-
-
84898540344
-
Intrusion Response Systems: A Survey, in 47907-2086 4, Center for Education and Research
-
Purdue University, West Lafayette
-
Bingrui Foo, Matthew W. Glause, Gaspar M. Howard, Yu-Sung Wu, Saurabh Bagchi, Eugene H. Spafford, Intrusion Response Systems: A Survey, IN 47907-2086 4, Center for Education and Research, Information Assurance and Security (CERIAS Tech Report), Purdue University, West Lafayette, 2008.
-
(2008)
Information Assurance and Security (CERIAS Tech Report)
-
-
Foo, B.1
Glause, M.W.2
Howard, G.M.3
Wu, Y.4
Bagchi, S.5
Spafford, E.H.6
-
19
-
-
35248825464
-
An intrusion response scheme: Tracking the source using the stigmergy paradigm
-
Bologna, Italy, July
-
N. Foukia, S. Hassas, S. Fenet, J. Hulaas, An intrusion response scheme: tracking the source using the stigmergy paradigm, in: Proceedings of AAMAS'2002 Workshop on Security of Mobile Multiagents Systems, Bologna, Italy, July 2002, pp. 18-26.
-
(2002)
Proceedings of AAMAS'2002 Workshop on Security of Mobile Multiagents Systems
, pp. 18-26
-
-
Foukia, N.1
Hassas, S.2
Fenet, S.3
Hulaas, J.4
-
20
-
-
84871900133
-
An implementation of intrusion detection system using genetic algorithm
-
March 2012.
-
Mohammad Sazzadul Hoque, Md. Abdul Mukit, and Md. Abu Naser Bikas An implementation of intrusion detection system using genetic algorithm Int. J. Netw. Secur. Appl. (IJNSA) 4 2 2012 109 120 March 2012. http://dx.doi.org/10. 5121/ijnsa.2012.4208
-
(2012)
Int. J. Netw. Secur. Appl. (IJNSA)
, vol.4
, Issue.2
, pp. 109-120
-
-
Hoque, M.S.1
Abdul Mukit, Md.2
Abu Naser Bikas, Md.3
-
21
-
-
70449580323
-
A genetic algorithm for geometric primitives extraction
-
Paris, France, July 1-4
-
S. Kahlouche, K. Achour, O. Djekoune, A genetic algorithm for geometric primitives extraction, in: IEEE-Seventh International Symposium on Signal Processing and its Applications ISSPA2003, vol. 1, Paris, France, July 1-4, 2003, pp. 509-512.
-
(2003)
IEEE-Seventh International Symposium on Signal Processing and Its Applications ISSPA2003
, vol.1
, pp. 509-512
-
-
Kahlouche, S.1
Achour, K.2
Djekoune, O.3
-
22
-
-
33745727034
-
Multi-objective optimization using genetic algorithms: A tutorial
-
A. Konak, D.W. Coit, and A.E. Smith Multi-objective optimization using genetic algorithms: a tutorial Reliab. Eng. Syst. Safety 91 9 2006
-
(2006)
Reliab. Eng. Syst. Safety
, vol.91
, Issue.9
-
-
Konak, A.1
Coit, D.W.2
Smith, A.E.3
-
23
-
-
84898547861
-
A multi-objective based methodology for managing security projects in business organizations
-
Washington, October
-
J. Krichene, N. Boudriga, S. Guemara El Fatmi, A multi-objective based methodology for managing security projects in business organizations, in: ACM workshop on Business Driven Security Engineering (BIZSEC) in association with the 10th ACM Conference on Computer and Communication Security, Washington, October 2003.
-
(2003)
ACM Workshop on Business Driven Security Engineering (BIZSEC) in Association with the 10th ACM Conference on Computer and Communication Security
-
-
Krichene, J.1
Boudriga, N.2
Guemara El Fatmi, S.3
-
24
-
-
6344291287
-
Fuzzy cognitive maps for decision support in an automatic intrusion response mechanism
-
Shanghai, August 26-29 ISBN: 0-7803-8403-2
-
C.P. Mu, H.K. Huang, S.F. Tian, Fuzzy cognitive maps for decision support in an automatic intrusion response mechanism, in: Proceedings of 2004 International Conference on Machine Learning and Cybernetics, vol. 3, Shanghai, August 26-29, 2004, pp. 1789-1794. ISBN: 0-7803-8403-2.
-
(2004)
Proceedings of 2004 International Conference on Machine Learning and Cybernetics
, vol.3
, pp. 1789-1794
-
-
Mu, C.P.1
Huang, H.K.2
Tian, S.F.3
-
25
-
-
84898543610
-
Policies based intrusion response system for DBMS policies based intrusion response system for DBMS
-
December 2012. < >. ISSN: 2277-5420
-
Fatima Nayeem, and M. Vijayakamal Policies based intrusion response system for DBMS policies based intrusion response system for DBMS Int. J. Comput. Sci. Netw. (IJCSN) 1 6 2012 110 114 December 2012. < http://www.ijcsn.org >. ISSN: 2277-5420
-
(2012)
Int. J. Comput. Sci. Netw. (IJCSN)
, vol.1
, Issue.6
, pp. 110-114
-
-
Nayeem, F.1
Vijayakamal, M.2
-
26
-
-
84898546251
-
Design of An Intrusion Response System Using Evolutionary Computation
-
Computer Science Department, University of Missouri-Rolla, December 5
-
R. Parti, Design of An Intrusion Response System Using Evolutionary Computation, Research Paper as Requirement for cs401 (Evolutionary Computation), Computer Science Department, University of Missouri-Rolla, December 5, 2003.
-
(2003)
Research Paper As Requirement for cs401 (Evolutionary Computation)
-
-
Parti, R.1
-
27
-
-
0002629036
-
Emerald: Event monitoring enabling responses to anomalous live disturbances
-
Baltimore, MD, USA, September 7-11
-
P.A. Porras, P.G. Neumann, Emerald: event monitoring enabling responses to anomalous live disturbances, in: Proceedings of the 20th National Information Systems Security Conference (NIST-NCSC), Baltimore, MD, USA, September 7-11, 1997, pp. 353-365.
-
(1997)
Proceedings of the 20th National Information Systems Security Conference (NIST-NCSC)
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
28
-
-
77953651003
-
Multi-objective evolutionary algorithms based on the summation of normalized objectives and diversified selection
-
B.Y. Qu, and P.N. Suganthan Multi-objective evolutionary algorithms based on the summation of normalized objectives and diversified selection Inform. Sci. 180 17 2010 3170 3181
-
(2010)
Inform. Sci.
, vol.180
, Issue.17
, pp. 3170-3181
-
-
Qu, B.Y.1
Suganthan, P.N.2
-
29
-
-
33750291345
-
A real-coding jumping gene genetic algorithm (RJGGA) for multiobjective optimization
-
DOI 10.1016/j.ins.2006.07.019, PII S0020025506001733
-
K.S.N. Ripon, S. Kwong, and K.F. Man A real-coding jumping genetic algorithm (RJGGA) for multi-objective optimization Inform. Sci. 177 2007 632 654 (Pubitemid 44634453)
-
(2007)
Information Sciences
, vol.177
, Issue.2
, pp. 632-654
-
-
Nawaz Ripon, K.S.1
Kwong, S.2
Man, K.F.3
-
30
-
-
62749171666
-
Application of belief-desire-intention agents in intrusion detection & response
-
Security and Trust, PST 04 University of New Brunswick Fredericton Canada
-
M. Shajari, and A.A. Ghorbani Application of belief-desire-intention agents in intrusion detection & response Proceedings of the Second Annual Conference on Privacy Security and Trust, PST 04 2004 University of New Brunswick Fredericton Canada 181 191
-
(2004)
Proceedings of the Second Annual Conference on Privacy
, pp. 181-191
-
-
Shajari, M.1
Ghorbani, A.A.2
-
31
-
-
84865058730
-
Intrusion response systems: Survey and taxonomy
-
Alireza Shameli-Sendi, Naser Ezzati-jivan, Masoume Jabbarifar, and Michel Dagenais Intrusion response systems: survey and taxonomy IJCSNS Int. J. Comput. Sci. Netw. Secur. 12 1 January 2012 1 14
-
(2012)
IJCSNS Int. J. Comput. Sci. Netw. Secur.
, vol.12
, Issue.1
, pp. 1-14
-
-
Shameli-Sendi, A.1
Ezzati-Jivan, N.2
Jabbarifar, M.3
Dagenais, M.4
-
34
-
-
34548237317
-
A hybrid multi-objective immune algorithm for a flow shop scheduling problem with bi-objectives: Weighted mean completion time and weighted mean tardiness
-
DOI 10.1016/j.ins.2007.06.001, PII S0020025507002861
-
R. Tavakkoli-Moghaddam, A. Rahimi-Vahed, and A.H. Mirzaei A hybrid multi-objective immune algorithm for a flow shop scheduling problem with biobjectives: weighted mean completion time and weighted mean tardiness Inform. Sci. 177 2007 5072 5090 (Pubitemid 47331458)
-
(2007)
Information Sciences
, vol.177
, Issue.22
, pp. 5072-5090
-
-
Tavakkoli-Moghaddam, R.1
Rahimi-Vahed, A.2
Mirzaei, A.H.3
-
36
-
-
77949735150
-
A multiple criteria decision making model for cno attack scheme evaluation
-
CiSE 2009, Number 11-13, Wuhan, December 2009 (ISBN: 978-1-4244-4507-3)
-
Danyan Wen, Yi Ji, Xiaojian Li, Haiquan Wang, A multiple criteria decision making model for cno attack scheme evaluation, in: International Conference on Computational Intelligence and Software Engineering, 2009, CiSE 2009, Number 11-13, Wuhan, December 2009, pp. 1-7 (ISBN: 978-1-4244-4507-3).
-
(2009)
International Conference on Computational Intelligence and Software Engineering
, pp. 1-7
-
-
Wen, D.1
Ji, Y.2
Li, X.3
Wang, H.4
-
37
-
-
84898540897
-
The Search for Optimality in Online Intrusion Response for a Distributed E-Commerce System
-
Electrical & Computer Engineering, Purdue University
-
Y.S. Wu, G.M. Howard, M. Glause, B. Foo, S. Bagchi, E. Spafford, The Search for Optimality in Online Intrusion Response for a Distributed E-Commerce System, Technical Report CERIAS TR 2007-94, Electrical & Computer Engineering, Purdue University, 2007.
-
(2007)
Technical Report CERIAS TR 2007-94
-
-
Wu, Y.S.1
Howard, G.M.2
Glause, M.3
Foo, B.4
Bagchi, S.5
Spafford, E.6
-
38
-
-
43849106075
-
Multi-objective decision making model under fuzzy random environment and its application to inventory problems
-
J.P. Xu, and Y.G. Liu Multi-objective decision making model under fuzzy random environment and its application to inventory problems Inform. Sci. 178 2008 2899 2914
-
(2008)
Inform. Sci.
, vol.178
, pp. 2899-2914
-
-
Xu, J.P.1
Liu, Y.G.2
-
39
-
-
84862979705
-
Superiority Index Method for Multiple Attribute Decision-Making under Uncertainty
-
Tokyo University of Science, Tokyo, June 14
-
J.P. Xu, Sh. Wang, J.M. Shi, Superiority Index Method for Multiple Attribute Decision-Making under Uncertainty, Madis Working Paper msps-e-01-14, Tokyo University of Science, Tokyo, June 14, 2001.
-
(2001)
Madis Working Paper msps-e-01-14
-
-
Xu, J.P.1
Wang, Sh.2
Shi, J.M.3
-
40
-
-
70449601784
-
A three-dimensional encoding genetic algorithm for job shop scheduling
-
H. Yin, Y. Wang, N. Xiao, E. Hu, Y. Jiang, A three-dimensional encoding genetic algorithm for job shop scheduling, in: 2007 International Conference on Computational Intelligence and Security Workshops, 2007.
-
(2007)
2007 International Conference on Computational Intelligence and Security Workshops
-
-
Yin, H.1
Wang, Y.2
Xiao, N.3
Hu, E.4
Jiang, Y.5
-
41
-
-
84898544191
-
Contextual fuzzy cognitive map for intrusion response system
-
May 15, 2013. ISSN: 2279-0764
-
Montaceur Zaghdoud, and Mohammed Saeed Al-Kahtani Contextual fuzzy cognitive map for intrusion response system Int. J. Comput. Inform. Technol. 02 3 2013 471 478 May 15, 2013. ISSN: 2279-0764
-
(2013)
Int. J. Comput. Inform. Technol.
, vol.2
, Issue.3
, pp. 471-478
-
-
Zaghdoud, M.1
Al-Kahtani, M.S.2
-
42
-
-
84898540541
-
An intrusion response system with multiobjective system security metric functions
-
S.A. Zonouz, An intrusion response system with multiobjective system security metric functions, in: Proceedings of ESTEL Conference, 2012.
-
(2012)
Proceedings of ESTEL Conference
-
-
Zonouz, S.A.1
|