-
1
-
-
84901192690
-
A survey of intrusion detection techniques for cyber-physical systems
-
R. Mitchell and I.-R. Chen, "A survey of intrusion detection techniques for cyber-physical systems," ACM Comput. Surveys, vol. 46, no. 4, p. 55, 2014.
-
(2014)
ACM Comput. Surveys
, vol.46
, Issue.4
, pp. 55
-
-
Mitchell, R.1
Chen, I.-R.2
-
2
-
-
84888391622
-
A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
-
Apr.
-
S. Zargar, J. Joshi, and D. Tipper, "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks," IEEE Commun. Surveys Tuts., vol. 15, no. 4, pp. 2046-2069, Apr. 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.4
, pp. 2046-2069
-
-
Zargar, S.1
Joshi, J.2
Tipper, D.3
-
3
-
-
0002473030
-
Dids (distributed intrusion detection system)-motivation, architecture, and an early prototype
-
S. R. Snapp et al., "Dids (distributed intrusion detection system)-motivation, architecture, and an early prototype," in Proc. 14th Nat. Comput. Security Conf., 1991, vol. 1, pp. 167-176.
-
(1991)
Proc. 14th Nat. Comput. Security Conf.
, vol.1
, pp. 167-176
-
-
Snapp, S.R.1
-
4
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
C. V. Zhou, C. Leckie, and S. Karunasekera, "A survey of coordinated attacks and collaborative intrusion detection," Comput. Security, vol. 29, no. 1, pp. 124-140, 2010.
-
(2010)
Comput. Security
, vol.29
, Issue.1
, pp. 124-140
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
-
5
-
-
78149465725
-
Architectures for the future networks and the next generation Internet: A survey
-
S. Paul, J. Pan, and R. Jain, "Architectures for the future networks and the next generation Internet: A survey," Comput. Commun., vol. 34, no. 1, pp. 2-42, 2011.
-
(2011)
Comput. Commun.
, vol.34
, Issue.1
, pp. 2-42
-
-
Paul, S.1
Pan, J.2
Jain, R.3
-
6
-
-
85028098285
-
Parametric methods for anomaly detection in aggregate traffic
-
Apr.
-
G. Thatte, U. Mitra, and J. Heidemann, "Parametric methods for anomaly detection in aggregate traffic," IEEE/ACM Trans. Netw., vol. 19, no. 2, pp. 512-525, Apr. 2011.
-
(2011)
IEEE/ACM Trans. Netw.
, vol.19
, Issue.2
, pp. 512-525
-
-
Thatte, G.1
Mitra, U.2
Heidemann, J.3
-
7
-
-
84860544941
-
Firecol: A collaborative protection network for the detection of flooding DDoS attacks
-
Dec.
-
J. François, I. Aib, and R. Boutaba, "Firecol: A collaborative protection network for the detection of flooding DDoS attacks," IEEE/ACM Trans. Netw., vol. 20, no. 6, pp. 1828-1841, Dec. 2012.
-
(2012)
IEEE/ACM Trans. Netw.
, vol.20
, Issue.6
, pp. 1828-1841
-
-
François, J.1
Aib, I.2
Boutaba, R.3
-
8
-
-
84655161362
-
Collaborative anomaly-based detection of large-scale Internet attacks
-
T. Gamer, "Collaborative anomaly-based detection of large-scale Internet attacks," Comput. Netw., vol. 56, no. 1, pp. 169-185, 2012.
-
(2012)
Comput. Netw.
, vol.56
, Issue.1
, pp. 169-185
-
-
Gamer, T.1
-
9
-
-
84864984635
-
Collaborative detection of traffic anomalies using first order Markov chains
-
D. Dudek, "Collaborative detection of traffic anomalies using first order Markov chains," in Proc. 9th IEEE Int. Conf. Netw. Sensing Syst., 2012, pp. 1-4.
-
(2012)
Proc. 9th IEEE Int. Conf. Netw. Sensing Syst.
, pp. 1-4
-
-
Dudek, D.1
-
10
-
-
84868098039
-
Vicsifter: A collaborative DDoS detection system with lightweight victim identification
-
F. Wang, X. Wang, J. Su, and B. Xiao, "Vicsifter: A collaborative DDoS detection system with lightweight victim identification," in Proc. 11th IEEE Int. Conf. Trust, Security Privacy Comput. Commun, 2012, pp. 215-222.
-
(2012)
Proc. 11th IEEE Int. Conf. Trust, Security Privacy Comput. Commun
, pp. 215-222
-
-
Wang, F.1
Wang, X.2
Su, J.3
Xiao, B.4
-
11
-
-
84893403269
-
CoDef: Collaborative defense against large-scale link-flooding attacks
-
S. B. Lee, M. S. Kang, and V. D. Gligor, "CoDef: Collaborative defense against large-scale link-flooding attacks," in Proc. CoNEXT, 2013, pp. 417-428.
-
(2013)
Proc. CoNEXT
, pp. 417-428
-
-
Lee, S.B.1
Kang, M.S.2
Gligor, V.D.3
-
12
-
-
84863381941
-
Detecting anomalous insiders in collaborative information systems
-
May-Jun.
-
Y. Chen, S. Nyemba, and B. Malin, "Detecting anomalous insiders in collaborative information systems," IEEE Trans. Depend. Secure Comput., vol. 9, no. 3, pp. 332-344, May-Jun. 2012.
-
(2012)
IEEE Trans. Depend. Secure Comput.
, vol.9
, Issue.3
, pp. 332-344
-
-
Chen, Y.1
Nyemba, S.2
Malin, B.3
-
13
-
-
84857574309
-
Dcdidp: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments
-
S. T. Zargar, H. Takabi, and J. B. Joshi, "Dcdidp: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments," in Proc. 7th IEEE Int. Conf. Collab. Comput., Netw., Appl. Worksharing, 2011, pp. 332-341.
-
(2011)
Proc. 7th IEEE Int. Conf. Collab. Comput., Netw., Appl. Worksharing
, pp. 332-341
-
-
Zargar, S.T.1
Takabi, H.2
Joshi, J.B.3
-
14
-
-
84865661798
-
A collaborative approach to botnet protection
-
New York: Springer
-
M. Stevanovic, K. Revsbech, J. M. Pedersen, R. Sharp, and C. D. Jensen, "A collaborative approach to botnet protection," in Multidisciplinary Research and Practice for Information Systems. New York: Springer, 2012, pp. 624-638.
-
(2012)
Multidisciplinary Research and Practice for Information Systems
, pp. 624-638
-
-
Stevanovic, M.1
Revsbech, K.2
Pedersen, J.M.3
Sharp, R.4
Jensen, C.D.5
-
15
-
-
34547936756
-
A proactive malware identification system based on the computer hygiene principles
-
V. Vlachos and D. Spinellis, "A proactive malware identification system based on the computer hygiene principles," Inf. Manage. Comput. Security, vol. 15, no. 4, pp. 295-312, 2007.
-
(2007)
Inf. Manage. Comput. Security
, vol.15
, Issue.4
, pp. 295-312
-
-
Vlachos, V.1
Spinellis, D.2
-
16
-
-
84959443050
-
Dependency-based distributed intrusion detection
-
Boston, MA, USA, Jul.
-
J. Li, D.-Y. Lim, and K. R. Sollins, "Dependency-based distributed intrusion detection," in Proc. DETER Community Workshop Cyber Security Exper. Test, Boston, MA, USA, Jul. 2007, p. 8.
-
(2007)
Proc. DETER Community Workshop Cyber Security Exper. Test
, pp. 8
-
-
Li, J.1
Lim, D.-Y.2
Sollins, K.R.3
-
17
-
-
85137546697
-
Global intrusion detection in the domino overlay system
-
V. Yegneswaran, P. Barford, and S. Jha, "Global intrusion detection in the domino overlay system," in Proc. NDSS, 2004.
-
(2004)
Proc. NDSS
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
-
18
-
-
44849134557
-
A global security architecture for intrusion detection on computer networks
-
A. Karim Ganame, J. R. Bourgeois, R. Bidou, and F. Spies, "A global security architecture for intrusion detection on computer networks," Comput. Security, vol. 27, no. 1, pp. 30-47, 2008.
-
(2008)
Comput. Security
, vol.27
, Issue.1
, pp. 30-47
-
-
Karim Ganame, A.1
Bourgeois, J.R.2
Bidou, R.3
Spies, F.4
-
19
-
-
49949084678
-
Multi-agent reinforcement learning for intrusion detection
-
New York, NY, USA: Springer
-
A. Servin and D. Kudenko, "Multi-agent reinforcement learning for intrusion detection," in Lecture Notes in Computer Science. New York, NY, USA: Springer, 2008, vol. 4865, pp. 211-223.
-
(2008)
Lecture Notes in Computer Science
, vol.4865
, pp. 211-223
-
-
Servin, A.1
Kudenko, D.2
-
20
-
-
33745469273
-
Towards collaborative security and P2P intrusion detection
-
M. E. Locasto, J. J. Parekh, A. D. Keromytis, and S. J. Stolfo, "Towards collaborative security and P2P intrusion detection," in Proc. IEEE Inf. Assurance Workshop, 2005, pp. 333-339.
-
(2005)
Proc. IEEE Inf. Assurance Workshop
, pp. 333-339
-
-
Locasto, M.E.1
Parekh, J.J.2
Keromytis, A.D.3
Stolfo, S.J.4
-
21
-
-
84955725691
-
Collaborative attack detection using distributed hash tables
-
New York, NY, USA: Springer
-
P. E. Verssimo, E. Angori, M. Colajanni, M. Marchetti, and M. Messori, "Collaborative attack detection using distributed hash tables," in Collaborative Financial Infrastructure Protection. New York, NY, USA: Springer, 2012, pp. 175-201.
-
(2012)
Collaborative Financial Infrastructure Protection
, pp. 175-201
-
-
Verssimo, P.E.1
Angori, E.2
Colajanni, M.3
Marchetti, M.4
Messori, M.5
-
22
-
-
79957530146
-
Low-rate DDoS attacks detection and traceback by using new information metrics
-
Jun.
-
Y. Xiang, K. Li, and W. Zhou, "Low-rate DDoS attacks detection and traceback by using new information metrics," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 426-437, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.2
, pp. 426-437
-
-
Xiang, Y.1
Li, K.2
Zhou, W.3
-
23
-
-
84865446336
-
Enhancing collaborative intrusion detection methods using a Kademlia overlay network
-
New York, NY, USA: Springer
-
Z. Czirkos and G. Hosszú, "Enhancing collaborative intrusion detection methods using a Kademlia overlay network," in Information and Communication Technologies. New York, NY, USA: Springer, 2012, pp. 52-63.
-
(2012)
Information and Communication Technologies
, pp. 52-63
-
-
Czirkos, Z.1
Hosszú, G.2
-
24
-
-
77249132188
-
A survey of network virtualization
-
N. Chowdhury and R. Boutaba, "A survey of network virtualization," Comput. Netw., vol. 54, no. 5, pp. 862-876, 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.5
, pp. 862-876
-
-
Chowdhury, N.1
Boutaba, R.2
-
25
-
-
84888365739
-
Virtual network embedding: A survey
-
4th Quart
-
A. Fischer, J. F. Botero, M. Till Beck, H. De Meer, and X. Hesselbach, "Virtual network embedding: A survey," IEEE Commun. Surveys Tuts., vol. 15, no. 4, pp. 1888-1906, 4th Quart., 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.4
, pp. 1888-1906
-
-
Fischer, A.1
Botero, J.F.2
Till Beck, M.3
De Meer, H.4
Hesselbach, X.5
-
26
-
-
84872169450
-
Network virtualization: Technologies, perspectives, and frontiers
-
Feb.
-
A. Wang, M. Iyer, R. Dutta, G. N. Rouskas, and I. Baldine, "Network virtualization: Technologies, perspectives, and frontiers," J. Lightw. Technol., vol. 31, no. 4, pp. 523-537, Feb. 2013.
-
(2013)
J. Lightw. Technol.
, vol.31
, Issue.4
, pp. 523-537
-
-
Wang, A.1
Iyer, M.2
Dutta, R.3
Rouskas, G.N.4
Baldine, I.5
-
27
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Feb.
-
L. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989.
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.1
-
28
-
-
0003925908
-
-
New York, NY, USA: Springer
-
S. Z. Li and S. Singh, Markov Random Field Modeling in Image Analysis. New York, NY, USA: Springer, 2009, vol. 26.
-
(2009)
Markov Random Field Modeling in Image Analysis
, vol.26
-
-
Li, S.Z.1
Singh, S.2
-
29
-
-
0002629270
-
Maximum likelihood from incomplete data via the em algorithm
-
A. P. Dempster, N. M. Laird, and D. B. Rubin, "Maximum likelihood from incomplete data via the EM algorithm," J. Royal Statist. Soc. Ser. B, Methodological, vol. 39, no. 1, pp. 1-38, 1977.
-
(1977)
J. Royal Statist. Soc. Ser. B, Methodological
, vol.39
, Issue.1
, pp. 1-38
-
-
Dempster, A.P.1
Laird, N.M.2
Rubin, D.B.3
-
30
-
-
84875930318
-
-
9th ed. Boston, MA, USA: Brooks/Cole Cengage Learning
-
R. L. Burden and J. D. Faires, Numerical Analysis, 9th ed. Boston, MA, USA: Brooks/Cole Cengage Learning, 2011.
-
(2011)
Numerical Analysis
-
-
Burden, R.L.1
Faires, J.D.2
-
35
-
-
16244366026
-
Index for rating diagnostic tests
-
W. J. Youden, "Index for rating diagnostic tests," Cancer, vol. 3, no. 1, pp. 32-35, 1950.
-
(1950)
Cancer
, vol.3
, Issue.1
, pp. 32-35
-
-
Youden, W.J.1
|