-
1
-
-
79957496407
-
Critical infrastructure protection: A 21st century challenge
-
doi: 10.1109/ICCITECHNOL.2011.5762681
-
M. Merabti, M. Kennedy, and W. Hurst, "Critical infrastructure protection: A 21st century challenge", Proc. IEEE International Conference on Communications and Information Technology (ICCIT), pp. 1-6, 2011, doi: 10.1109/ICCITECHNOL.2011.5762681.
-
(2011)
Proc. IEEE International Conference on Communications and Information Technology (ICCIT)
, pp. 1-6
-
-
Merabti, M.1
Kennedy, M.2
Hurst, W.3
-
2
-
-
77949526615
-
Creating a simulation environment for critical infrastructure interdependencies study
-
doi: 10.1109/IEEM.2009.5373155
-
I. Eusgeld and C. Nan, "Creating a simulation environment for critical infrastructure interdependencies study", Proc. IEEE International Conference on Industrial Engineering and Engineering Management, (IEEM 2009), pp. 2104-2108, 2009, doi: 10.1109/IEEM.2009.5373155.
-
(2009)
Proc. IEEE International Conference on Industrial Engineering and Engineering Management, (IEEM 2009)
, pp. 2104-2108
-
-
Eusgeld, I.1
Nan, C.2
-
3
-
-
84919687334
-
Behavioural analysis for supporting critical infrastructure security
-
W. Hurst, M. Merabti, and P. Fergus, "Behavioural Analysis for Supporting Critical Infrastructure Security", Proc. The 14th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 2013, doi:
-
(2013)
Proc. The 14th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting
-
-
Hurst, W.1
Merabti, M.2
Fergus, P.3
-
4
-
-
84875607371
-
Managing critical infrastructures through behavioural observation
-
doi: 10.1109/NESEA.2012.6474015
-
W. Hurst, M. Merabti, and P. Fergus, "Managing critical infrastructures through behavioural observation", Proc. IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA), pp. 1-6, 2012, doi: 10.1109/NESEA.2012.6474015.
-
(2012)
Proc. IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)
, pp. 1-6
-
-
Hurst, W.1
Merabti, M.2
Fergus, P.3
-
6
-
-
33645791274
-
Honeycomb: Creating intrusion detection signatures using honeypots
-
doi: 10.1145/972374.972384
-
C. Kreibich and J. Crowcroft, "Honeycomb: creating intrusion detection signatures using honeypots", ACM SIGCOMM Computer Communication, vol. 34 issue: 1, 2004, pp 51-56, doi: 10.1145/972374.972384.
-
(2004)
ACM SIGCOMM Computer Communication
, vol.34
, Issue.1
, pp. 51-56
-
-
Kreibich, C.1
Crowcroft, J.2
-
7
-
-
77953988606
-
UTM-CM: A practical control mechanism solution for UTM system
-
doi: 10.1109/CMC.2010.267
-
Y. Zhang, F. Deng, Z. Chen, Y. Xue, and C. Lin, "UTM-CM: A Practical Control Mechanism Solution for UTM System", Proc. IEEE International Conference on Communicaions and Mobile Computing (CMC), 2010, pp. 86-90, doi: 10.1109/CMC.2010.267
-
(2010)
Proc. IEEE International Conference on Communicaions and Mobile Computing (CMC)
, pp. 86-90
-
-
Zhang, Y.1
Deng, F.2
Chen, Z.3
Xue, Y.4
Lin, C.5
-
8
-
-
78651261999
-
Using the confusion matrix for improving ensemble classifiers
-
doi: 10.1109/EEEI.2010.5662159
-
N. Marom, L. Rokach, and A. Shmilovici, "Using the Confusion Matrix for Improving Ensemble Classifiers", Proc. The 26th IEEE Convention of Electrical and Electronics Engineers in Israel (IEEEI), 2010, pp. 000555-000559, doi: 10.1109/EEEI.2010.5662159.
-
(2010)
Proc. The 26th IEEE Convention of Electrical and Electronics Engineers in Israel (IEEEI)
, pp. 000555-000559
-
-
Marom, N.1
Rokach, L.2
Shmilovici, A.3
|