-
1
-
-
84910673471
-
-
National Vulnerability Database version 2.0, Available at (Accessed: 1 August 2012).
-
NIST. National Vulnerability Database version 2.0, 2012. Available at: http://nvd.nist.gov/ (Accessed: 1 August 2012).
-
(2012)
-
-
-
2
-
-
84910679750
-
-
Symantec Internet security threat report-trends for 2010, Available at: (Accessed: 16 July 2011).
-
Symantec. Symantec Internet security threat report-trends for 2010, 2011. Available at: http://www.symantec.com/business/threatreport/index.jsp (Accessed: 16 July 2011).
-
(2011)
-
-
-
3
-
-
70449353683
-
Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree
-
Anuar NB, Sallehudin H, Gani A, Zakaria O. Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree. Malaysian Journal of Computer Science 2008; 21(2):101-115.
-
(2008)
Malaysian Journal of Computer Science
, vol.21
, Issue.2
, pp. 101-115
-
-
Anuar, N.B.1
Sallehudin, H.2
Gani, A.3
Zakaria, O.4
-
4
-
-
84867026580
-
Magic quadrant for security information and event management
-
Gartner RAS Core Research Note G00167782
-
Nicolett M, Kavanagh K. Magic quadrant for security information and event management, Gartner RAS Core Research Note G00167782, 2009.
-
(2009)
-
-
Nicolett, M.1
Kavanagh, K.2
-
5
-
-
81855175691
-
Intrusion detection: systems and models
-
Pittsburgh, PA, USA
-
Sherif JS, Dearmond TG. Intrusion detection: systems and models, Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2002), Pittsburgh, PA, USA, 2002; 115-133.
-
(2002)
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2002)
, pp. 115-133
-
-
Sherif, J.S.1
Dearmond, T.G.2
-
7
-
-
84888388073
-
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique
-
Shamshirband S, Anuar NB, Kiah MLM, Patel A. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. Engineering Applications of Artificial Intelligence 2013; 26(9):2105-2127.
-
(2013)
Engineering Applications of Artificial Intelligence
, vol.26
, Issue.9
, pp. 2105-2127
-
-
Shamshirband, S.1
Anuar, N.B.2
Kiah, M.L.M.3
Patel, A.4
-
9
-
-
70449517238
-
An intrusion response decision-making model based on hierarchical task network planning
-
Mu C, Li Y. An intrusion response decision-making model based on hierarchical task network planning. Expert Systems with Applications 2010; 37(3):2465-2472.
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.3
, pp. 2465-2472
-
-
Mu, C.1
Li, Y.2
-
13
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
Lee W, Fan W, Miller M, Stolfo SJ, Zadok E. Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security 2002; 10(1-2):5-22.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.J.4
Zadok, E.5
-
14
-
-
38149125428
-
Cost-sensitive intrusion responses for mobile ad hoc networks
-
Gold Goast, Australia
-
Wang SH, Tseng CH, Levitt K, Bishop M. Cost-sensitive intrusion responses for mobile ad hoc networks, Proceedings of the Recent Advances in Intrusion Detection, Vol. 4637, Gold Goast, Australia, 2007; 127-145.
-
(2007)
Proceedings of the Recent Advances in Intrusion Detection
, vol.4637
, pp. 127-145
-
-
Wang, S.H.1
Tseng, C.H.2
Levitt, K.3
Bishop, M.4
-
15
-
-
34548775838
-
A cost-sensitive model for preemptive intrusion response systems
-
Niagara Falls, Canada
-
Stakhanova N, Basu S, Wong J. A cost-sensitive model for preemptive intrusion response systems, Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA '07), Niagara Falls, Canada, 2007; 428-435.
-
(2007)
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA '07)
, pp. 428-435
-
-
Stakhanova, N.1
Basu, S.2
Wong, J.3
-
16
-
-
27644574459
-
Informing the decision process in an automated intrusion response system
-
Papadaki M, Furnell SM. Informing the decision process in an automated intrusion response system, Information Security Technical Report 2005, Vol. 10 No. 3, pp. 150-161,
-
(2005)
Information Security Technical
, vol.10
, Issue.3
, pp. 150-161
-
-
Papadaki, M.1
Furnell, S.M.2
-
17
-
-
27544503196
-
ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment
-
Yokohama, Japan
-
Foo B, Wu YS, Mao YC, Bagchi S, Spafford E. ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment, Proceedings of the International Conference on Dependable Systems and Networks (DSN 2005), Yokohama, Japan, 2005; 508-517.
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks (DSN 2005)
, pp. 508-517
-
-
Foo, B.1
Wu, Y.S.2
Mao, Y.C.3
Bagchi, S.4
Spafford, E.5
-
18
-
-
0033299558
-
Simulating cyber attacks, defences, and consequences
-
Cohen F. Simulating cyber attacks, defences, and consequences. Computers & Security 1999; 18(6):479-518.
-
(1999)
Computers & Security
, vol.18
, Issue.6
, pp. 479-518
-
-
Cohen, F.1
-
20
-
-
84880643302
-
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)
-
Anuar NB, Papadaki M, Furnell S, Clarke N. Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM). Security Communication Networks 2013; 6(9): 1087-1116.
-
(2013)
Security Communication Networks
, vol.6
, Issue.9
, pp. 1087-1116
-
-
Anuar, N.B.1
Papadaki, M.2
Furnell, S.3
Clarke, N.4
-
23
-
-
0034862244
-
Risk analysis, systems analysis, and covey's seven habits perspectives
-
Haimes YY. Risk analysis, systems analysis, and covey's seven habits perspectives. Risk Analysis 2001; 21(2):217-224.
-
(2001)
Risk Analysis
, vol.21
, Issue.2
, pp. 217-224
-
-
Haimes, Y.Y.1
-
24
-
-
70350671732
-
Understanding and supporting personal activity management by IT service workers
-
San Diego, California
-
Gonzalez VM, Galicia L, Favela J. Understanding and supporting personal activity management by IT service workers, Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology, San Diego, California, 2008; 1-10.
-
(2008)
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
, pp. 1-10
-
-
Gonzalez, V.M.1
Galicia, L.2
Favela, J.3
-
26
-
-
0036532669
-
Extending the risk process to manage opportunities
-
Hillson D. Extending the risk process to manage opportunities. International Journal of Project Management 2002; 20(3):235-240.
-
(2002)
International Journal of Project Management
, vol.20
, Issue.3
, pp. 235-240
-
-
Hillson, D.1
-
28
-
-
0034818337
-
An integrated approach for risk response development in project planning
-
Ben-David I, Raz T. An integrated approach for risk response development in project planning. Journal of the Operational Research Society 2001; 52:14-25.
-
(2001)
Journal of the Operational Research Society
, vol.52
, pp. 14-25
-
-
Ben-David, I.1
Raz, T.2
-
30
-
-
84910600781
-
-
DARPA intrusion detection data sets, Available at: (Accessed: 1 July 2011).
-
DARPA. DARPA intrusion detection data sets, 2011. Available at: http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html (Accessed: 1 July 2011).
-
(2011)
-
-
-
31
-
-
77954327949
-
MARS: multi-stage attack recognition system
-
Perth, Australia
-
Alserhani F, Akhlaq M, Awan IU, Cullen AJ, Mirchandani P. MARS: multi-stage attack recognition system, Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), Perth, Australia, 2010; 753-759.
-
(2010)
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (AINA)
, pp. 753-759
-
-
Alserhani, F.1
Akhlaq, M.2
Awan, I.U.3
Cullen, A.J.4
Mirchandani, P.5
-
32
-
-
77955430292
-
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
-
Tjhai GC, Furnell SM, Papadaki M, Clarke NL. A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. Computers & Security 2010; 29(6):712-723.
-
(2010)
Computers & Security
, vol.29
, Issue.6
, pp. 712-723
-
-
Tjhai, G.C.1
Furnell, S.M.2
Papadaki, M.3
Clarke, N.L.4
-
33
-
-
48249145157
-
Investigating the problem of IDS false alarms: an experimental study using Snort
-
Milano, Italy
-
Tjhai GC, Papadaki M, Furnell SM, Clarke NL. Investigating the problem of IDS false alarms: an experimental study using Snort, Proceedings of the IFIP TC 11 23rd International Information Security Conference, Vol. 278, Milano, Italy, 2008; 253-267.
-
(2008)
Proceedings of the IFIP TC 11 23rd International Information Security Conference
, vol.278
, pp. 253-267
-
-
Tjhai, G.C.1
Papadaki, M.2
Furnell, S.M.3
Clarke, N.L.4
-
35
-
-
84910664235
-
-
Available at: (Accessed: 1 March 2011).
-
GCIA. GIAC Certified Intrusion Analyst (GCIA), 2011. Available at: http://www.giac.org/certifications/security/gcia.php (Accessed: 1 March 2011).
-
(2011)
GIAC Certified Intrusion Analyst (GCIA)
-
-
-
37
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
Ning P, Cui Y, Reeves DS, Xu D. Techniques and tools for analyzing intrusion alerts. ACM Transactions on Information System Security 2004; 7(2):274-318.
-
(2004)
ACM Transactions on Information System Security
, vol.7
, Issue.2
, pp. 274-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
38
-
-
84863716009
-
FuzMet: a fuzzy-logic based alert prioritization engine for intrusion detection systems
-
Alsubhi K, Aib I, Boutaba R. FuzMet: a fuzzy-logic based alert prioritization engine for intrusion detection systems. International Journal of Network Management 2012; 22(4): 263-284.
-
(2012)
International Journal of Network Management
, vol.22
, Issue.4
, pp. 263-284
-
-
Alsubhi, K.1
Aib, I.2
Boutaba, R.3
|