-
1
-
-
70849118379
-
RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks
-
Amin S., Siddiqui M., Hong C., and Lee S., "RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks, " Journal of Sensors, vol. 9, no. 5, pp. 3447-3468, 2009.
-
(2009)
Journal of Sensors
, vol.9
, Issue.5
, pp. 3447-3468
-
-
Amin, S.1
Siddiqui, M.2
Hong, C.3
Lee, S.4
-
2
-
-
84904024862
-
Identifying false alarm for network intrusion detection system using data mining and decision tree
-
In Bucharest, Romania
-
th Conference on Data Networks, Communications, Computers, Bucharest, Romania, 2008.
-
(2008)
th Conference on Data Networks, Communications, Computers
-
-
Anuar, N.1
Sallehudin, H.2
-
3
-
-
78651583709
-
Agent IDS based on Misuse Approach
-
Barika S., Kadhi M., and Ghédira C., "Agent IDS based on Misuse Approach, " Journal of Software, vol. 4, pp. 495-507, 2009.
-
(2009)
Journal of Software
, vol.4
, pp. 495-507
-
-
Barika, S.1
Kadhi, M.2
Ghédira, C.3
-
4
-
-
84903941214
-
Next-Generation Misuse and Anomaly Prevention System
-
In edited by Joaquim Filipe and José Cordeiro,: Springer BerlinHeidelberg
-
Bringas A., García P., and Penya Y., "Next-Generation Misuse and Anomaly Prevention System, " In Enterprise Information Systems, edited by Joaquim Filipe and José Cordeiro, pp. 117-129: Springer BerlinHeidelberg. 2008.
-
(2008)
Enterprise Information Systems
, pp. 117-129
-
-
Bringas, A.1
García, P.2
Penya, Y.3
-
5
-
-
84904023460
-
-
Available at, (accessed at: 16 October 2009)
-
Chichakli R., "Information Systems Risk Management, " Available at: http: //www.iscpa.com/Risk_Management.htm (accessed at: 16 October 2009).
-
Information Systems Risk Management
-
-
Chichakli, R.1
-
6
-
-
42449088961
-
A survey of Autonomic Computing-Degrees, Models, and Applications
-
Huebscher M. and Julie A., "A survey of Autonomic Computing-Degrees, Models, and Applications. " ACM Computing Surveys, vol. 40, no. 3. 2008.
-
(2008)
ACM Computing Surveys
, vol.40
, Issue.3
-
-
Huebscher, M.1
Julie, A.2
-
8
-
-
77649235431
-
Filtering intrusion detection alarms
-
Mansour N., Chehab I., and Faour A., "Filtering intrusion detection alarms, " Springer Netherlands, vol 13, no 1, pp 19-29, 2010.
-
(2010)
Springer Netherlands
, vol.13
, Issue.1
, pp. 19-29
-
-
Mansour, N.1
Chehab, I.2
Faour, A.3
-
9
-
-
78049513508
-
A Survey of Intrusion Detection and Prevention Systems
-
Patel A., Qassim Q., and Wills C. "A Survey of Intrusion Detection and Prevention Systems, " Information Management and Computer Security, vol. 18, no. 4, 2010.
-
(2010)
Information Management and Computer Security
, vol.18
, Issue.4
-
-
Patel, A.1
Qassim, Q.2
Wills, C.3
-
10
-
-
83255163262
-
Intelligent Multi-Agent Based Multivariate Statistical Framework for Database Intrusion Prevention System
-
Ramasubramanian P. and Kannan A., "Intelligent Multi-Agent Based Multivariate Statistical Framework for Database Intrusion Prevention System, " The International Arab Journal of Information Technology, vol. 2, no. 3, 2005.
-
(2005)
The International Arab Journal of Information Technology
, vol.2
, Issue.3
-
-
Ramasubramanian, P.1
Kannan, A.2
-
12
-
-
77950949554
-
Reducing false positives in intrusion detection systems
-
Elsevier
-
Spathoulas G. and Katsikas S., "Reducing false positives in intrusion detection systems, " Journal of computer & security, Elsevier, pp. 1-10, 2009.
-
(2009)
Journal of computer & security
, pp. 1-10
-
-
Spathoulas, G.1
Katsikas, S.2
-
13
-
-
77955430292
-
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
-
Tjhai G., Furnell S., Papadaki M., and Clarke N., "A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm, " Centre for Security, Communications and Network Research, Computers & Security, vol. 29, no. 6, pp. 712-723, 2010.
-
(2010)
Centre for Security, Communications and Network Research, Computers & Security
, vol.29
, Issue.6
, pp. 712-723
-
-
Tjhai, G.1
Furnell, S.2
Papadaki, M.3
Clarke, N.4
-
14
-
-
79951742289
-
Principles of Information Security
-
Boston, MA, United States
-
Whitman M. and Mattord H., "Principles of Information Security, " Thomson Course Technology, Boston, MA, United States, 2005.
-
(2005)
Thomson Course Technology
-
-
Whitman, M.1
Mattord, H.2
-
15
-
-
70449481775
-
Intrusion Detection Model Based on Hierarchical Fuzzy Inference System
-
In: IEEE Computer Society Press
-
Zhou A., Ping M., and Fang S., "Intrusion Detection Model Based on Hierarchical Fuzzy Inference System, " In Second International Conference on Information and Computing Science, pp. 144-147: IEEE Computer Society Press, 2009.
-
(2009)
Second International Conference on Information and Computing Science
, pp. 144-147
-
-
Zhou, A.1
Ping, M.2
Fang, S.3
|