-
1
-
-
85028299305
-
-
Cert/cc statistics
-
Cert (2012). Cert/cc statistics. http://www.cert.org/stats/
-
(2012)
-
-
-
3
-
-
84865247943
-
Seeking help: The important role of ethical hackers
-
Conrad, J. (2012). Seeking help: The important role of ethical hackers. Network Security, 8, 5–8.
-
(2012)
Network Security
, vol.8
, pp. 5-8
-
-
Conrad, J.1
-
4
-
-
84862028033
-
Why multi-layered security is still the best defence
-
Denman, S. (2012). Why multi-layered security is still the best defence. Network Security, 3, 5–7.
-
(2012)
Network Security
, vol.3
, pp. 5-7
-
-
Denman, S.1
-
6
-
-
84887913727
-
Living with cybercrime
-
Hilbert, E. (2013). Living with cybercrime. Network Security, 11, 15–17.
-
(2013)
Network Security
, vol.11
, pp. 15-17
-
-
Hilbert, E.1
-
7
-
-
84958533802
-
Analysis of cyber attacks and security intelligence
-
Berlin, Heidelberg: Springer
-
Kim, Y., Kim, I., & Park, N. (2014). Analysis of cyber attacks and security intelligence. In James J. (Jong Hyuk) Park, H. Adeli, N. Park & I. Woungang (Eds.), Mobile, ubiquitous, and intelligent computing, Lecture Notes in Electrical Engineering, Vol. 274 (pp. 489–494). Berlin, Heidelberg: Springer.
-
(2014)
James J. (Jong Hyuk) Park, H. Adeli, N. Park & I. Woungang (Eds.), Mobile, Ubiquitous, and Intelligent Computing, Lecture Notes Inelectrical Engineering
, vol.274
, pp. 489-494
-
-
Kim, Y.1
Kim, I.2
Park, N.3
-
8
-
-
80052332194
-
21–22). AI based supervised classifiers: An analysis for intrusion detection
-
A. Mantri & M. Khurana (Eds.), New York: ACM
-
Kumar, G., & Kumar, K. (2011, July 21–22). AI based supervised classifiers: An analysis for intrusion detection. In A. Mantri & M. Khurana (Eds.), Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, Rajpura, Punjab (pp. 170–174). New York: ACM.
-
(2011)
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, Rajpura, Punjab
, pp. 170-174
-
-
Kumar, G.1
Kumar, K.2
-
9
-
-
84856248608
-
An information theoretic approach for feature selection
-
Kumar, G., & Kumar, K. (2012). An information theoretic approach for feature selection. Security and Communication Networks, 5(2), 178–185. doi:10.1002/sec.303
-
(2012)
Security and Communication Networks
, vol.5
, Issue.2
, pp. 178-185
-
-
Kumar, G.1
Kumar, K.2
-
10
-
-
78650169163
-
The use of artificial intelligence based techniques for intrusion detection: A review
-
Kumar, G., Kumar, K., & Sachdeva, M. (2010a). The use of artificial intelligence based techniques for intrusion detection: A review. Artificial Intelligence Review 34(4), 369–387.
-
(2010)
Artificial Intelligence Review
, vol.34
, Issue.4
, pp. 369-387
-
-
Kumar, G.1
Kumar, K.2
Sachdeva, M.3
-
11
-
-
80052334682
-
An empirical comparative analysis of feature reduction methods for intrusion detection. International Journal of Information and Telecommunication
-
Kumar, G., Kumar, K., & Sachdeva, M. (2010b). An empirical comparative analysis of feature reduction methods for intrusion detection. International Journal of Information and Telecommunication Technology, 1(1), 44–51.
-
(2010)
Technology
, vol.1
, Issue.1
, pp. 44-51
-
-
Kumar, G.1
Kumar, K.2
Sachdeva, M.3
-
12
-
-
85028320589
-
-
PandaLabs (2012). 2012 annual report pandalabs. Retrieved September 23, 2013, form http://press.pandasecurity.com/wp -content/uploads/2013/02/PandaLabs-Annual-Report-2012. pdf.
-
(2012)
-
-
-
13
-
-
85028323999
-
-
PandaLabs (2013). Pandalabs quarterly report January – March 2013. Retrieved September 23, 2013, form http://press. pandasecurity.com/wp-content/uploads/2010/05/PandaLabs-Quaterly-Report.pdf
-
(2013)
-
-
-
14
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
Patcha, A., & Park, J. M. (2007). An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 51(12), 3448–3470. doi:10.1016/j.comnet.2007.02.001
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
15
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
Peng, T., Leckie, C., & Ramamohanarao, K. (2007). Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys (CSUR), 39(1), Article 3. doi:10.1145/1216370.1216373
-
(2007)
ACM Computing Surveys (CSUR)
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
16
-
-
85006579377
-
The state of information security
-
Potts, M. (2012). The state of information security. Network Security, 2012(7), 9–11.
-
(2012)
Network Security
, vol.2012
, Issue.7
, pp. 9-11
-
-
Potts, M.1
-
17
-
-
38149114545
-
16–20). The curse of ease of access to the internet
-
P. McDaniel & S. K. Gupta (Eds.), Berlin Heidelberg: Springer
-
Ramamohanarao, K., Gupta, K., Peng, T., & Leckie, C. (2007, December 16–20). The curse of ease of access to the internet. In P. McDaniel & S. K. Gupta (Eds.), Information Systems Security, Third International Conference, ICISS 2007 Proceedings, Delhi (pp. 234–249). Berlin Heidelberg: Springer.
-
(2007)
Information Systems Security, Third International Conference, ICISS 2007 Proceedings, Delhi
, pp. 234-249
-
-
Ramamohanarao, K.1
Gupta, K.2
Peng, T.3
Leckie, C.4
-
18
-
-
66249142696
-
Performance analysis of web service under ddos attacks
-
New York: IEEE
-
Sachdeva, M., Kumar, K., Singh, G., & Singh, K. (2009, March 6–7). Performance analysis of web service under ddos attacks. Proceedings of International Advance Computing Conference (IACC), Patiala, India (pp. 1002–1007). New York: IEEE.
-
(2009)
Proceedings of International Advance Computing Conference (IACC), Patiala
, pp. 1002-1007
-
-
Sachdeva, M.1
Kumar, K.2
Singh, G.3
Singh, K.4
-
19
-
-
84857767605
-
The state of network security
-
Schneider, D. (2012). The state of network security. Network Security, 2012(2), 14–20.
-
(2012)
Network Security
, vol.2012
, Issue.2
, pp. 14-20
-
-
Schneider, D.1
-
23
-
-
84892403835
-
The big four-what we did wrong in advanced persistent threat detection?
-
New York: IEEE
-
Virvilis, N., & Gritzalis, D. (2013, September 2–6). The big four-what we did wrong in advanced persistent threat detection? Availability, Reliability and Security (ARES), 2013 Eighth International Conference on, Regensburg (pp. 248–254). New York: IEEE.
-
(2013)
Availability, Reliability and Security (ARES), 2013 Eighth International Conference On, Regensburg
, pp. 248-254
-
-
Virvilis, N.1
Gritzalis, D.2
|