메뉴 건너뛰기




Volumn , Issue , 2010, Pages 223-234

Autonomic agent-based self-managed intrusion detection and prevention system

Author keywords

Anomaly detection; Autonomic computing; Information security; Intrusion detection; Intrusion prevention; Misuse detection; Self management

Indexed keywords

AUTHENTICATION; COMPUTER SYSTEM FIREWALLS; COMPUTER VIRUSES; CRYPTOGRAPHY; INFORMATION MANAGEMENT; MOBILE SECURITY; RISK ASSESSMENT; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84926184444     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (27)

References (17)
  • 4
    • 64549160247 scopus 로고    scopus 로고
    • Next-generation misuse and anomaly prevention system
    • edited by Joaquim Filipe and José Cordeiro Springer Berlin Heidelberg
    • Bringas, Pablo García, and Yoseba K. Penya. "Next-Generation Misuse and Anomaly Prevention System." In Enterprise Information Systems, edited by Joaquim Filipe and José Cordeiro, 117-29: Springer Berlin Heidelberg, 2009.
    • (2009) Enterprise Information Systems , pp. 117-129
    • Bringas, P.G.1    Penya, Y.K.2
  • 6
    • 51049084560 scopus 로고    scopus 로고
    • Design and implementation of an anomaly detection system: An empirical approach
    • Paper presented at
    • Deri, Luca, Stefano Suin, and Gaia Maselli. "Design and Implementation of an Anomaly Detection System: An Empirical Approach." Paper presented at the Terena Networking Conference 2003.
    • (2003) The Terena Networking Conference
    • Deri, L.1    Suin, S.2    Maselli, G.3
  • 7
    • 42449088961 scopus 로고    scopus 로고
    • Asurvey of autonomic computing - Degrees, models, and applications
    • Huebscher, Markus C., and JULIE A. Mccann. "Asurvey of Autonomic Computing - Degrees, Models, and Applications." ACM Computing Surveys 40, no. 3 (2008).
    • (2008) ACM Computing Surveys , vol.40 , Issue.3
    • Huebscher, M.C.1    Julie, A.M.2
  • 8
    • 71949099820 scopus 로고    scopus 로고
    • Intrusion prevention system base on immune vaccination
    • Jiang, Yaping, and Junlin Chang. "Intrusion Prevention System Base on Immune Vaccination." IEEE Computer Society (2009): 350-53
    • (2009) IEEE Computer Society , pp. 350-353
    • Jiang, Y.1    Chang, J.2
  • 9
    • 0037253062 scopus 로고    scopus 로고
    • The vision of autonomic computing
    • Kephart, and Chess. "The Vision of Autonomic Computing." IEEE Computer Society 36, no. 1 (2003): 41-50.
    • (2003) IEEE Computer Society , vol.36 , Issue.1 , pp. 41-50
    • Kephart1    Chess2
  • 13
    • 80054085347 scopus 로고    scopus 로고
    • Multi-level and secured agent-based intrusion detection system
    • Sodiya, A. S. (2006) Multi-level and Secured Agent-based Intrusion Detection System. Journal of Computing and Information Technology, 14, 217-223.
    • (2006) Journal of Computing and Information Technology , vol.14 , pp. 217-223
    • Sodiya, A.S.1
  • 17
    • 70449481775 scopus 로고    scopus 로고
    • Intrusion detection model based on hierarchical fuzzy inference system
    • IEEE Computer Society Press
    • Zhou, Ping, and Jian Fang. "Intrusion Detection Model Based on Hierarchical Fuzzy Inference System." In Second International Conference on Information and Computing Science, 144-47: IEEE Computer Society Press, 2009.
    • (2009) Second International Conference on Information and Computing Science , pp. 144-147
    • Zhou, P.1    Fang, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.