-
2
-
-
85132890376
-
A survey on intrusion detection in mobile ad hoc networks
-
Springer
-
T. Anantvalee, and J. Wu A survey on intrusion detection in mobile ad hoc networks Wireless Network Security 2007 Springer 159 180
-
(2007)
Wireless Network Security
, pp. 159-180
-
-
Anantvalee, T.1
Wu, J.2
-
3
-
-
78149489905
-
An investigation and survey of response options for Intrusion Response Systems (IRSs)
-
N.B. Anuar, M. Papadaki, S. Furnell, and N. Clarke An investigation and survey of response options for Intrusion Response Systems (IRSs) Inf Secur South Afr 2010 1 8
-
(2010)
Inf Secur South Afr
, pp. 1-8
-
-
Anuar, N.B.1
Papadaki, M.2
Furnell, S.3
Clarke, N.4
-
4
-
-
70449353683
-
Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree
-
N.B. Anuar, H. Sallehudin, A. Gani, and O. Zakari Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree Malays J Comput Sci 21 2008 101 115
-
(2008)
Malays J Comput Sci
, vol.21
, pp. 101-115
-
-
Anuar, N.B.1
Sallehudin, H.2
Gani, A.3
Zakari, O.4
-
7
-
-
33646835755
-
Real-time risk assessment with network sensors and intrusion detection systems
-
Springer
-
A. Årnes, K. Sallhammar, K. Haslum, T. Brekne, M.E.G. Moe, and S.J. Knapskog Real-time risk assessment with network sensors and intrusion detection systems Computational intelligence and security 2005 Springer 388 397
-
(2005)
Computational Intelligence and Security
, pp. 388-397
-
-
Årnes, A.1
Sallhammar, K.2
Haslum, K.3
Brekne, T.4
Moe, M.E.G.5
Knapskog, S.J.6
-
8
-
-
84920181628
-
Autonomic schemes for threat mitigation in Internet of Things
-
Q.M. Ashraf, and M.H. Habaebi Autonomic schemes for threat mitigation in Internet of Things J Netw Comput Appl 49 2015 112 127
-
(2015)
J Netw Comput Appl
, vol.49
, pp. 112-127
-
-
Ashraf, Q.M.1
Habaebi, M.H.2
-
9
-
-
48749093494
-
A comprehensive taxonomy of DDOS attacks and defense mechanism applying in a smart classification
-
A. Asosheh, and N. Ramezani A comprehensive taxonomy of DDOS attacks and defense mechanism applying in a smart classification WSEAS Trans Comput 7 2008 281 290
-
(2008)
WSEAS Trans Comput
, vol.7
, pp. 281-290
-
-
Asosheh, A.1
Ramezani, N.2
-
11
-
-
0003907293
-
-
Book ISBN:1-57870-185-6
-
Bace RG. Intrusion detection, (http://dl.acm.org/citation.cfm?id=347487), Book; 2002. ISBN:1-57870-185-6.
-
(2002)
Intrusion Detection
-
-
Bace, R.G.1
-
14
-
-
84894652457
-
A survey of intrusion detection systems in wireless sensor networks
-
I. Butun, S.D. Morgera, and R. Sankar A survey of intrusion detection systems in wireless sensor networks Commun Surv Tutorials IEEE 16 2014 266 282
-
(2014)
Commun Surv Tutorials IEEE
, vol.16
, pp. 266-282
-
-
Butun, I.1
Morgera, S.D.2
Sankar, R.3
-
18
-
-
84954506028
-
-
Cert. CERT statistics [Accessed on October 2014]
-
Cert. CERT statistics, http://www.cert.org/stats; 2014 [Accessed on October 2014].
-
(2014)
-
-
-
20
-
-
80955142795
-
The cyber threat landscape: Challenges and future research directions
-
K.-K.R. Choo The cyber threat landscape: challenges and future research directions Comput Secur 30 2011 719 731
-
(2011)
Comput Secur
, vol.30
, pp. 719-731
-
-
Choo, K.-K.R.1
-
21
-
-
84954471157
-
-
Cisco. [Accessed on October, 2014]
-
Cisco. (http://www.cisco.com/cisco/web/solutions/small-business/resource-center/articles/secure-my-business/what-is
-
(2014)
-
-
-
22
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
da Silva APR, Martins MH, Rocha BP, Loureiro AA, Ruiz LB, Wong HC. Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM Int workshop Qual Serv Secur Wirel Mob Netw: ACM 2005 16 23.
-
(2005)
Proceedings of the 1st ACM Int Workshop Qual Serv Secur Wirel Mob Netw: ACM
, vol.16
, pp. 23
-
-
Silva APR, D.1
Martins, M.H.2
Rocha, B.P.3
Loureiro, A.A.4
Ruiz, L.B.5
Wong, H.C.6
-
24
-
-
84954513460
-
-
[Accessed on August 2014]
-
Deris Stiawan MYI, Abdul Hanan Abdullah, (http://eprints.unsri.ac.id/73/1/2011-7-12-4212-4224.pdf); 2011 [Accessed on August 2014].
-
(2011)
-
-
Stiawan MYI, D.1
Hanan Abdullah, A.2
-
27
-
-
59549096053
-
Predicting intrusion goal using dynamic Bayesian network with transfer probability estimation
-
L. Feng, W. Wang, L. Zhu, and Y. Zhang Predicting intrusion goal using dynamic Bayesian network with transfer probability estimation J Netw Comput Appl 32 2009 721 732
-
(2009)
J Netw Comput Appl
, vol.32
, pp. 721-732
-
-
Feng, L.1
Wang, W.2
Zhu, L.3
Zhang, Y.4
-
28
-
-
27544503196
-
ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment
-
IEEE
-
Foo B, Wu Y-S, Mao Y-C, Bagchi S, Spafford E. ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment. In: Proceedings international conference on dependable systems and networks, 2005 DSN. IEEE; 2005. p. 508-17.
-
(2005)
Proceedings International Conference on Dependable Systems and Networks, 2005 DSN
, pp. 508-517
-
-
Foo, B.1
Wu, Y.-S.2
Mao, Y.-C.3
Bagchi, S.4
Spafford, E.5
-
29
-
-
0003541908
-
Architecture design of a scalable intrusion detection system for the emerging network infrastructure
-
Releigh (NC, USA): Department of Computer Science, North Carolina State University Releigh
-
Frank Y, Jou FG, Chandru Sargor, Shyhtsun Felix Wu, Cleaveland W Rance. Architecture design of a scalable intrusion detection system for the emerging network infrastructure. Technical Report CDRL A005. Releigh (NC, USA): Department of Computer Science, North Carolina State University Releigh; 1997.
-
(1997)
Technical Report CDRL A005
-
-
Frank, Y.1
Jou, F.G.2
Sargor, C.3
Felix Wu, S.4
Rance, C.W.5
-
32
-
-
15744370034
-
A taxonomy of network and computer attacks
-
S. Hansman, and R. Hunt A taxonomy of network and computer attacks Comput Secur 24 2005 31 43
-
(2005)
Comput Secur
, vol.24
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
-
34
-
-
78650135042
-
MOVIH-IDS: A mobile-visualization hybrid intrusion detection system
-
Á. Herrero, E. Corchado, M.A. Pellicer, and A. Abraham MOVIH-IDS: a mobile-visualization hybrid intrusion detection system Neurocomputing 72 2009 2775 2784
-
(2009)
Neurocomputing
, vol.72
, pp. 2775-2784
-
-
Herrero, Á.1
Corchado, E.2
Pellicer, M.A.3
Abraham, A.4
-
35
-
-
84863242123
-
Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems
-
C.-Y. Ho, Y.-C. Lai, I.-W. Chen, F.-Y. Wang, and W.-H. Tai Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems IEEE Commun Mag 50 2012 146 154
-
(2012)
IEEE Commun Mag
, vol.50
, pp. 146-154
-
-
Ho, C.-Y.1
Lai, Y.-C.2
Chen, I.-W.3
Wang, F.-Y.4
Tai, W.-H.5
-
36
-
-
84896319063
-
Network attacks: Taxonomy, tools and systems
-
N. Hoque, M.H. Bhuyan, R.C. Baishya, D. Bhattacharyya, and J.K. Kalita Network attacks: taxonomy, tools and systems J Netw Comput Appl 40 2014 307 324
-
(2014)
J Netw Comput Appl
, vol.40
, pp. 307-324
-
-
Hoque, N.1
Bhuyan, M.H.2
Baishya, R.C.3
Bhattacharyya, D.4
Kalita, J.K.5
-
37
-
-
0033293621
-
A large scale distributed intrusion detection framework based on attack strategy analysis
-
M.-Y. Huang, R.J. Jasper, and T.M. Wicks A large scale distributed intrusion detection framework based on attack strategy analysis Comput Netw 31 1999 2465 2475
-
(1999)
Comput Netw
, vol.31
, pp. 2465-2475
-
-
Huang, M.-Y.1
Jasper, R.J.2
Wicks, T.M.3
-
38
-
-
84903312615
-
False alarm minimization techniques in signature-based intrusion detection systems: A survey
-
13:128
-
N. Hubballi, and Vinoth Suryanarayanan False alarm minimization techniques in signature-based intrusion detection systems: a survey Comput Commun 49 2014 1 17 13:128
-
(2014)
Comput Commun
, vol.49
, pp. 1-17
-
-
Hubballi, N.1
Suryanarayanan, V.2
-
40
-
-
84962306569
-
Design and implementation of a scalable intrusion detection system for the protection of network infrastructure
-
IEEE
-
Jou Y, Gong F, Sargor C, Wu X, Wu S, Chang H, et al. Design and implementation of a scalable intrusion detection system for the protection of network infrastructure. In: 2000 DISCEX×00 proceedings DARPA information survivability conference and exposition. IEEE; 2000. p. 69-83.
-
(2000)
2000 DISCEX×00 Proceedings DARPA Information Survivability Conference and Exposition
, pp. 69-83
-
-
Jou, Y.1
Gong, F.2
Sargor, C.3
Wu, X.4
Wu, S.5
Chang, H.6
-
43
-
-
84923382316
-
An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking
-
A. Karami, and M. Guerrero-Zapata An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking Comput Netw 80 2015 51 65
-
(2015)
Comput Netw
, vol.80
, pp. 51-65
-
-
Karami, A.1
Guerrero-Zapata, M.2
-
44
-
-
84912115872
-
A fuzzy anomaly detection system based on hybrid pso-kmeans algorithm in content-centric networks
-
A. Karami, and M. Guerrero-Zapata A fuzzy anomaly detection system based on hybrid pso-kmeans algorithm in content-centric networks Neurocomputing 149 2015 1253 1269
-
(2015)
Neurocomputing
, vol.149
, pp. 1253-1269
-
-
Karami, A.1
Guerrero-Zapata, M.2
-
45
-
-
84918495473
-
A hybrid multiobjective rbf-pso method for mitigating dos attacks in named data networking
-
A. Karami, and M. Guerrero-Zapata A hybrid multiobjective rbf-pso method for mitigating dos attacks in named data networking Neurocomputing 151 2015 1262 1282
-
(2015)
Neurocomputing
, vol.151
, pp. 1262-1282
-
-
Karami, A.1
Guerrero-Zapata, M.2
-
46
-
-
84928207325
-
Big data: Survey, technologies, opportunities, and challenges
-
N. Khan, I. Yaqoob, I.A.T. Hashem, Z. Inayat, W.K. Mahmoud Ali, M. Alam, and et al. Big data: survey, technologies, opportunities, and challenges Sci World J 2014 2014
-
(2014)
Sci World J
, pp. 2014
-
-
Khan, N.1
Yaqoob, I.2
Hashem, I.A.T.3
Inayat, Z.4
Mahmoud Ali, W.K.5
Alam, M.6
-
47
-
-
84904646449
-
A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing
-
S. Khan, M. Shiraz, A.W. Abdul Wahab, A. Gani, Q. Han, and Z. Bin Abdul Rahman A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing Sci World J 2014 2014
-
(2014)
Sci World J
, pp. 2014
-
-
Khan, S.1
Shiraz, M.2
Abdul Wahab, A.W.3
Gani, A.4
Han, Q.5
Bin Abdul Rahman, Z.6
-
50
-
-
70449629563
-
Cost evaluation for intrusion response using dependency graphs
-
IEEE
-
Kheir N, Debar H, Cuppens-Boulahia N, Cuppens F, Viinikka J. Cost evaluation for intrusion response using dependency graphs. In: 2009 N2S×09 international conference on network and service security. IEEE; 2009a. p. 1-6.
-
(2009)
2009 N2S×09 International Conference on Network and Service Security
, pp. 1-6
-
-
Kheir, N.1
Debar, H.2
Cuppens-Boulahia, N.3
Cuppens, F.4
Viinikka, J.5
-
51
-
-
70350658278
-
A service dependency modeling framework for policy-based response enforcement
-
Springer
-
N. Kheir, H. Debar, F. Cuppens, N. Cuppens-Boulahia, and J. Viinikka A service dependency modeling framework for policy-based response enforcement Detection of intrusions and malware, and vulnerability assessment 2009 Springer 176 195
-
(2009)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 176-195
-
-
Kheir, N.1
Debar, H.2
Cuppens, F.3
Cuppens-Boulahia, N.4
Viinikka, J.5
-
53
-
-
61649086771
-
Cooperative intrusion detection in wireless sensor networks
-
Springer
-
I. Krontiris, Z. Benenson, T. Giannetsos, F.C. Freiling, and T. Dimitriou Cooperative intrusion detection in wireless sensor networks Wireless sensor networks 2009 Springer 263 278
-
(2009)
Wireless Sensor Networks
, pp. 263-278
-
-
Krontiris, I.1
Benenson, Z.2
Giannetsos, T.3
Freiling, F.C.4
Dimitriou, T.5
-
56
-
-
84954509596
-
-
Laboratory L. [Accessed on October 2014]
-
Laboratory L. (http://www.ll.mit.edu/ideval/data/); 2000 [Accessed on October 2014].
-
(2000)
-
-
-
59
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
W. Lee, W. Fan, M. Miller, S.J. Stolfo, and E. Zadok Toward cost-sensitive modeling for intrusion detection and response J Comput Secur 10 2002 5 22
-
(2002)
J Comput Secur
, vol.10
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.J.4
Zadok, E.5
-
60
-
-
81355154787
-
An ontology-based intrusion alerts correlation system
-
W. Li, and S. Tian An ontology-based intrusion alerts correlation system Expert Syst Appl 37 2010 7138 7146
-
(2010)
Expert Syst Appl
, vol.37
, pp. 7138-7146
-
-
Li, W.1
Tian, S.2
-
64
-
-
84866351667
-
Definition of response metrics for an ontology-based Automated Intrusion Response Systems
-
V. Mateos, V.A. Villagrá, F. Romero, and J. Berrocal Definition of response metrics for an ontology-based Automated Intrusion Response Systems Comput Electr Eng 38 2012 1102 1114
-
(2012)
Comput Electr Eng
, vol.38
, pp. 1102-1114
-
-
Mateos, V.1
Villagrá, V.A.2
Romero, F.3
Berrocal, J.4
-
65
-
-
84901192690
-
A survey of intrusion detection techniques for cyber-physical systems
-
R. Mitchell, and I.-R. Chen A survey of intrusion detection techniques for cyber-physical systems ACM Comput Surv (CSUR) 46 2014 55
-
(2014)
ACM Comput Surv (CSUR)
, vol.46
, pp. 55
-
-
Mitchell, R.1
Chen, I.-R.2
-
66
-
-
84874959990
-
Effect of intrusion detection and response on reliability of cyber physical systems
-
R. Mitchell, and I. Chen Effect of intrusion detection and response on reliability of cyber physical systems Reliab IEEE Trans 62 2013 199 210
-
(2013)
Reliab IEEE Trans
, vol.62
, pp. 199-210
-
-
Mitchell, R.1
Chen, I.2
-
67
-
-
57049181381
-
Online risk assessment of intrusion scenarios using DS evidence theory
-
Springer
-
C. Mu, X. Li, H. Huang, and S. Tian Online risk assessment of intrusion scenarios using DS evidence theory Computer Security-ESORICS 2008 2008 Springer 35 48
-
(2008)
Computer Security-ESORICS 2008
, pp. 35-48
-
-
Mu, C.1
Li, X.2
Huang, H.3
Tian, S.4
-
68
-
-
70449517238
-
An intrusion response decision-making model based on hierarchical task network planning
-
C. Mu, and Y. Li An intrusion response decision-making model based on hierarchical task network planning Expert Syst Appl 37 2010 2465 2472
-
(2010)
Expert Syst Appl
, vol.37
, pp. 2465-2472
-
-
Mu, C.1
Li, Y.2
-
69
-
-
84954555878
-
-
MyCert-Report MyCERT "Malaysian Computer Emergency response Team Incident Statistics« [Accessed on October 2014]
-
MyCert-Report. MyCERT "Malaysian Computer Emergency response Team Incident Statistics«, Available on: (http://www.mycert.org.my/en/services/statistic/mycert/2013/main/detail/914/index.html); 2014 [Accessed on October 2014].
-
(2014)
-
-
-
71
-
-
84879894593
-
Protection of MANETs from a range of attacks using an intrusion detection and prevention system
-
A. Nadeem, and M. Howarth Protection of MANETs from a range of attacks using an intrusion detection and prevention system Telecommun Syst 52 2013 2047 2058
-
(2013)
Telecommun Syst
, vol.52
, pp. 2047-2058
-
-
Nadeem, A.1
Howarth, M.2
-
72
-
-
84888646473
-
An intrusion detection & adaptive response mechanism for MANETs
-
A. Nadeem, and M.P. Howarth An intrusion detection & adaptive response mechanism for MANETs Ad Hoc Netw 13 2014 368 380
-
(2014)
Ad Hoc Netw
, vol.13
, pp. 368-380
-
-
Nadeem, A.1
Howarth, M.P.2
-
74
-
-
84893764188
-
The Internet of Things: Do more devices mean more risks?
-
M. O×Neill The Internet of Things: do more devices mean more risks? Comput Fraud Secur 2014 16 17
-
(2014)
Comput Fraud Secur
, pp. 16-17
-
-
Oneill, M.1
-
76
-
-
33744811458
-
Achieving automated intrusion response: A prototype implementation
-
M. Papadaki, and S. Furnell Achieving automated intrusion response: a prototype implementation Inf Manag Comput Secur 14 2006 235 251
-
(2006)
Inf Manag Comput Secur
, vol.14
, pp. 235-251
-
-
Papadaki, M.1
Furnell, S.2
-
77
-
-
84870667876
-
An intrusion detection and prevention system in cloud computing: A systematic review
-
A. Patel, M. Taghavi, K. Bakhtiyari, and J.C. Júnior An intrusion detection and prevention system in cloud computing: a systematic review J Netw Comput Appl 36 2013 25 41
-
(2013)
J Netw Comput Appl
, vol.36
, pp. 25-41
-
-
Patel, A.1
Taghavi, M.2
Bakhtiyari, K.3
Júnior, J.C.4
-
78
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson Bro: a system for detecting network intruders in real-time Comput Netw 31 1999 2435 2463
-
(1999)
Comput Netw
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
81
-
-
84927804589
-
Sierpinski triangle based data center architecture in cloud computing
-
H. Qi, M. Shiraz, A. Gani, M. Whaiduzzaman, and S. Khan Sierpinski triangle based data center architecture in cloud computing J Supercomput 2014 1 21
-
(2014)
J Supercomput
, pp. 1-21
-
-
Qi, H.1
Shiraz, M.2
Gani, A.3
Whaiduzzaman, M.4
Khan, S.5
-
82
-
-
0034499251
-
Adaptation techniques for intrusion detection and intrusion response systems
-
IEEE
-
Ragsdale DJ, Carver Jr. CA, Humphries JW, Pooch UW. Adaptation techniques for intrusion detection and intrusion response systems. In: 2000 IEEE international conference on systems, man, and cybernetics. IEEE; 2000. p. 2344-9.
-
(2000)
2000 IEEE International Conference on Systems, Man, and Cybernetics
, pp. 2344-2349
-
-
Ragsdale, D.J.1
Carver, C.A.2
Humphries, J.W.3
Pooch, U.W.4
-
83
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
M. Roesch Snort: lightweight intrusion detection for networks LISA 1999 229 238
-
(1999)
LISA
, pp. 229-238
-
-
Roesch, M.1
-
84
-
-
84954491527
-
-
Room SIIR. [Accessed on 27th May 2014]
-
Room SIIR. (http://www.sans.org/reading-room/whitepapers/malicious/code-red-worm-45); 2001 [Accessed on 27th May 2014].
-
(2001)
-
-
-
87
-
-
33645141316
-
Intrusion prevention systems: Security×s silver bullet?
-
SANS Institute, and S. Dinesh Intrusion prevention systems: security×s silver bullet? Bus Commun Rev 33 2003 36 41
-
(2003)
Bus Commun Rev
, vol.33
, pp. 36-41
-
-
Institute, S.1
Dinesh, S.2
-
88
-
-
58149104386
-
Guide to intrusion detection and prevention systems (IDPS)
-
K. Scarfone, and P. Mell Guide to intrusion detection and prevention systems (IDPS) NIST Spec Publ 800 2007 94
-
(2007)
NIST Spec Publ
, vol.800
, pp. 94
-
-
Scarfone, K.1
Mell, P.2
-
89
-
-
42449117164
-
Guide to intrusion detection and prevention systems (IDPS), Sp-800-94
-
National Institute of Science and Technology National Institute of Science and Technology Gaithersburg
-
K. Scarfone, and P. Mell Guide to intrusion detection and prevention systems (IDPS), Sp-800-94 Special Publication NIST 2007 National Institute of Science and Technology National Institute of Science and Technology Gaithersburg
-
(2007)
Special Publication NIST
-
-
Scarfone, K.1
Mell, P.2
-
90
-
-
84964506507
-
Cooperative intrusion traceback and response architecture (CITRA)
-
Schnackengerg D, Holliday H, Smith R, Djahandari K, Sterne D. Cooperative intrusion traceback and response architecture (CITRA). In: 2001 DISCEX×01 Proceedings of the DARPA information survivability conference & exposition II: IEEE; 2001. p. 56-68.
-
(2001)
2001 DISCEX×01 Proceedings of the DARPA Information Survivability Conference & Exposition II: IEEE
, pp. 56-68
-
-
Schnackengerg, D.1
Holliday, H.2
Smith, R.3
Djahandari, K.4
Sterne, D.5
-
91
-
-
84901267947
-
Taxonomy of intrusion risk assessment and response system
-
A. Shameli-Sendi, M. Cheriet, and A. Hamou-Lhadj Taxonomy of intrusion risk assessment and response system Comput Secur 45 2014 1 16
-
(2014)
Comput Secur
, vol.45
, pp. 1-16
-
-
Shameli-Sendi, A.1
Cheriet, M.2
Hamou-Lhadj, A.3
-
92
-
-
84930617387
-
ORCEF: Online response cost evaluation framework for intrusion response system
-
A. Shameli-Sendi, and M. Dagenais ORCEF: online response cost evaluation framework for intrusion response system J Netw Comput Appl 2015
-
(2015)
J Netw Comput Appl
-
-
Shameli-Sendi, A.1
Dagenais, M.2
-
95
-
-
0002473030
-
DIDS (distributed intrusion detection system)-motivation, architecture, and an early prototype
-
Snapp SR, Brentano J, Dias GV, Goan TL, Heberlein LT, Ho, C-L, et al. DIDS (distributed intrusion detection system)-motivation, architecture, and an early prototype. In: Proceedings of the 14th national computer security conference. Citeseer; 1991. p. 167-76.
-
(1991)
Proceedings of the 14th National Computer Security Conference. Citeseer
, pp. 167-176
-
-
Snapp, S.R.1
Brentano, J.2
Dias, G.V.3
Goan, T.L.4
Heberlein, L.T.5
Ho, C.-L.6
-
96
-
-
84928920412
-
Geographic wormhole detection in wireless sensor networks
-
M. Sookhak, A. Akhundzada, A. Sookhak, M. Eslaminejad, A. Gani, M.K. Khan, and et al. Geographic wormhole detection in wireless sensor networks PLoS One 2015 10
-
(2015)
PLoS One
, pp. 10
-
-
Sookhak, M.1
Akhundzada, A.2
Sookhak, A.3
Eslaminejad, M.4
Gani, A.5
Khan, M.K.6
-
97
-
-
34548775838
-
A cost-sensitive model for preemptive intrusion response systems
-
N. Stakhanova, S. Basu, and J. Wong A cost-sensitive model for preemptive intrusion response systems AINA 2007 428 435
-
(2007)
AINA
, pp. 428-435
-
-
Stakhanova, N.1
Basu, S.2
Wong, J.3
-
100
-
-
77952350259
-
Intrusion response cost assessment methodology
-
ACM
-
Strasburg C, Stakhanova N, Basu S, Wong JS. Intrusion response cost assessment methodology. In: Proceedings of the 4th international symposium on information, computer, and communications security. ACM; 2009b. p. 388-91.
-
(2009)
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
, pp. 388-391
-
-
Strasburg, C.1
Stakhanova, N.2
Basu, S.3
Wong, J.S.4
-
101
-
-
70449465787
-
Adaptive intrusion response to minimize risk over multiple network attacks
-
S. Tanachaiwiwat, K. Hwang, and Y. Chen Adaptive intrusion response to minimize risk over multiple network attacks ACM Trans Inf Syst Secur 19 2002 1 30
-
(2002)
ACM Trans Inf Syst Secur
, vol.19
, pp. 1-30
-
-
Tanachaiwiwat, S.1
Hwang, K.2
Chen, Y.3
-
102
-
-
84954570526
-
-
Technology T-N. [Accessed on 27.05.14]
-
Technology T-N. (http://teleco-network.blogspot.com/search?q=firewall); 2011 [Accessed on 27.05.14].
-
(2011)
-
-
-
104
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
G. Vigna, and R.A. Kemmerer NetSTAT: a network-based intrusion detection system J Comput Secur 7 1999 37 71
-
(1999)
J Comput Secur
, vol.7
, pp. 37-71
-
-
Vigna, G.1
Kemmerer, R.A.2
-
105
-
-
0037002475
-
Intrusion detection: A brief history and overview
-
Garak Vigna Intrusion detection: a brief history and overview Computer 35 4 2002 0027 0030
-
(2002)
Computer
, vol.35
, Issue.4
, pp. 0027-0030
-
-
Vigna, G.1
-
106
-
-
33747198726
-
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
-
L. Wang, A. Liu, and S. Jajodia Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts Comput Commun 29 2006 2917 2933
-
(2006)
Comput Commun
, vol.29
, pp. 2917-2933
-
-
Wang, L.1
Liu, A.2
Jajodia, S.3
-
108
-
-
84904261405
-
Sleepy watermark tracing: An active network-based intrusion response framework
-
Springer
-
X. Wang, D.S. Reeves, S.F. Wu, and J. Yuill Sleepy watermark tracing: an active network-based intrusion response framework Trusted information 2001 Springer 369 384
-
(2001)
Trusted Information
, pp. 369-384
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
Yuill, J.4
-
109
-
-
0029756282
-
Cooperating security managers: A peer-based intrusion detection system
-
G.B. White, E.A. Fisch, and U.W. Pooch Cooperating security managers: a peer-based intrusion detection system IEEE Netw 10 1996 20 23
-
(1996)
IEEE Netw
, vol.10
, pp. 20-23
-
-
White, G.B.1
Fisch, E.A.2
Pooch, U.W.3
-
110
-
-
33846201259
-
Automated adaptive intrusion containment in systems of interacting services
-
Y.-S. Wu, B. Foo, Y.-C. Mao, S. Bagchi, and E.H. Spafford Automated adaptive intrusion containment in systems of interacting services Comput Netw 51 2007 1334 1360
-
(2007)
Comput Netw
, vol.51
, pp. 1334-1360
-
-
Wu, Y.-S.1
Foo, B.2
Mao, Y.-C.3
Bagchi, S.4
Spafford, E.H.5
-
112
-
-
80051791562
-
Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks
-
Z. Zhang, F. Naït-Abdesselam, P.-H. Ho, and Y. Kadobayashi Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks Comput Secur 30 2011 525 537
-
(2011)
Comput Secur
, vol.30
, pp. 525-537
-
-
Zhang, Z.1
Naït-Abdesselam, F.2
Ho, P.-H.3
Kadobayashi, Y.4
|