-
3
-
-
34547100991
-
An empirical analysis of the impact of software vulnerability announcements on firm stock price
-
Aug
-
Rahul Telang; Wattal, S., An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price, Software Engineering, IEEE Transactions on, vol.33, no.8, pp.544,557, Aug. 2007 doi: 10.1109/TSE.2007.70712
-
(2007)
Software Engineering, IEEE Transactions on
, vol.33
, Issue.8
, pp. 544-557
-
-
Telang, R.1
Wattal, S.2
-
4
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
Elsevier
-
C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, W.-Y. Lin, Intrusion detection by machine learning: A review, in Expert Systems with Applications, Vol. 36, N. 10, 2009, Elsevier, pp. 11994-12000
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.10
, pp. 11994-12000
-
-
Tsai, C.-F.1
Hsu, Y.-F.2
Lin, C.-Y.3
Lin, W.-Y.4
-
6
-
-
84881165833
-
Quantitative analysis of intrusion detection systems: Snort and suricata
-
J. S. White, T. T. Fitzsimmons, J. N. Matthews, Quantitative Analysis of Intrusion Detection Systems: Snort and Suricata, in Proc. of the SPIE, Volume 8757, 2013
-
(2013)
Proc. of the SPIE
, vol.8757
-
-
White, J.S.1
Fitzsimmons, T.T.2
Matthews, J.N.3
-
7
-
-
84983543961
-
-
Prelude IDS, https://www.prelude-ids.org
-
-
-
-
9
-
-
70449475826
-
Green support for PC-based software router: Performance evaluation and modeling
-
R. Bolla, R. Bruschi, A. Ranieri, Green support for PC-based software router: Performance evaluation and modeling, in Proc. IEEE International Conference on Communication, ICC '09, pp. 1-6
-
Proc. IEEE International Conference on Communication, ICC '09
, pp. 1-6
-
-
Bolla, R.1
Bruschi, R.2
Ranieri, A.3
-
10
-
-
81255164845
-
Saving energy in data center infrastructures (2011) proceedings-1st international conference on data compression
-
S. Ricciardi, D. Careglio, G. Santos-Boada, J. Sol-Pareta, U. Fiore, F. Palmieri, Saving energy in data center infrastructures (2011) Proceedings-1st International Conference on Data Compression, Communication, and Processing, CCP 2011, art. no. 6061033, pp. 265-270
-
(2011)
Communication, and Processing, CCP
, pp. 265-270
-
-
Ricciardi, S.1
Careglio, D.2
Santos-Boada, G.3
Sol-Pareta, J.4
Fiore, U.5
Palmieri, F.6
-
11
-
-
80052709736
-
Towards an energy-aware Internet
-
S. Ricciardi, D. Careglio, G. Santos-Boada, J. Solé-Pareta, U. Fiore, F. Palmieri, Towards an energy-aware Internet: Modeling a cross-layer optimization approach (2013) Telecommunication Systems, 52 (2), pp. 1247-1268
-
Modeling A Cross-layer Optimization Approach (2013) Telecommunication Systems
, vol.52
, Issue.2
, pp. 1247-1268
-
-
Ricciardi, S.1
Careglio, D.2
Santos-Boada, G.3
Solé-Pareta, J.4
Fiore, U.5
Palmieri, F.6
-
12
-
-
0031258214
-
Computer immnology
-
ACM
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, Computer Immnology, in Communications of the ACM, Vol 40, N. 10, 1997, ACM, pp. 88-96
-
(1997)
Communications of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
15
-
-
74849094435
-
New statistical approaches for anomaly detection
-
Wiley
-
C. Callegari, S. Giordano, M. Pagano, New statistical approaches for anomaly detection, in Security and Communication Networks, Vol. 2, N. 6, 2009, Wiley. pp. 611-634
-
(2009)
Security and Communication Networks
, vol.2
, Issue.6
, pp. 611-634
-
-
Callegari, C.1
Giordano, S.2
Pagano, M.3
-
16
-
-
84855860365
-
Evaluating network-based dos attacks under the energy consumption perspective
-
F. Palmieri, S. Ricciardi, U. Fiore, Evaluating network-based dos attacks under the energy consumption perspective: New security issues in the coming green ICT area (2011) Proceedings-2011 International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2011, art. no. 6103061, pp. 374-379
-
(2011)
New Security Issues in the Coming Green ICT Area (2011) Proceedings-2011 International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA
, pp. 374-379
-
-
Palmieri, F.1
Ricciardi, S.2
Fiore, U.3
-
17
-
-
84948156627
-
Measuring and estimating power consumption in Android to support energy-based intrusion detection
-
A. Merlo, M. Migliardi, P. Fontanelli, Measuring and estimating power consumption in Android to support energy-based intrusion detection (2015), Journal of Computer Security, 23 (5), pp. 611-637
-
(2015)
Journal of Computer Security
, vol.23
, Issue.5
, pp. 611-637
-
-
Merlo, A.1
Migliardi, M.2
Fontanelli, P.3
-
18
-
-
35449005874
-
Immune system approaches to intrusion detection: A review
-
Springer
-
J. Kim, P. J. Bentley, U. Aickelin, J. Greensmith, G. Tedesco, J. Twycoss, Immune system approaches to intrusion detection: a review, in Journal: Natural Computing, Vol 6, N. 4, 2007, Springer. pp. 413-466
-
(2007)
Journal: Natural Computing
, vol.6
, Issue.4
, pp. 413-466
-
-
Kim, J.1
Bentley, P.J.2
Aickelin, U.3
Greensmith, J.4
Tedesco, G.5
Twycoss, J.6
-
19
-
-
54949103368
-
Using genetic algorithm for network intrusion detection
-
W. Li, Using Genetic Algorithm for Network Intrusion Detection, in Proc. of DOE Cyber Security Group, 2004
-
(2004)
Proc. of DOE Cyber Security Group
-
-
Li, W.1
-
20
-
-
80052297709
-
Modeling the energy consumption of distributed IDS: A step towards green security MIPRO 2011-34th international convention on information and communication technology
-
M. Migliardi, A. Merlo, Modeling the energy consumption of distributed IDS: A step towards Green security MIPRO 2011-34th International Convention on Information and Communication Technology, Electronics and Microelectronics-Proceedings, art. no. 5967289, pp. 1452-1457
-
Electronics and Microelectronics-Proceedings
, pp. 1452-1457
-
-
Migliardi, M.1
Merlo, A.2
-
21
-
-
84888109639
-
Improving energy efficiency in distributed intrusion detection systems
-
IoSPress
-
M. Migliardi, A. Merlo, Improving energy efficiency in Distributed Intrusion Detection Systems, in Journal of High Speed Networks, Vol. 9, N. 3, 2013, IoSPress. pp. 251-264
-
(2013)
Journal of High Speed Networks
, vol.9
, Issue.3
, pp. 251-264
-
-
Migliardi, M.1
Merlo, A.2
-
22
-
-
84927725505
-
Optimizing network energy consumption through intrusion prevention systems
-
A. Merlo, M. Migliardi, D. Raso, E. Spadacini, Optimizing Network Energy Consumption through Intrusion Prevention Systems, in Proc. of the International Joint Conference SOCO14-CISIS14-ICEUTE14, 2014, pp. 505-515
-
(2014)
Proc. of the International Joint Conference SOCO14-CISIS14-ICEUTE14
, pp. 505-515
-
-
Merlo, A.1
Migliardi, M.2
Raso, D.3
Spadacini, E.4
-
24
-
-
84877583241
-
Energy-efficient routing protocols in wireless sensor networks: A survey
-
N.A. Pantazis, S. A. Nikolidakis, D. D. Vergados, Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey in IEEE Communications Surveys and Tutorials, Vol. 5 N. 2, 2013. pp. 551-591
-
(2013)
IEEE Communications Surveys and Tutorials
, vol.5
, Issue.2
, pp. 551-591
-
-
Pantazis, N.A.1
Nikolidakis, S.A.2
Vergados, D.D.3
-
25
-
-
84862025419
-
An energy-aware dynamic RWA framework for next-generation wavelength-routed networks
-
S. Ricciardi, F. Palmieri, U. Fiore, D. Careglio, G. Santos-Boada, J. Sol-Pareta, An energy-aware dynamic RWA framework for next-generation wavelength-routed networks (2012) Computer Networks, 56 (10), pp. 2420-2442
-
(2012)
Computer Networks
, vol.56
, Issue.10
, pp. 2420-2442
-
-
Ricciardi, S.1
Palmieri, F.2
Fiore, U.3
Careglio, D.4
Santos-Boada, G.5
Sol-Pareta, J.6
-
28
-
-
84920171739
-
Anomaly detection in computer networks: A state-of-The-art review
-
Al-Haj Baddar, A. Merlo, M. Migliardi Anomaly Detection in Computer Networks: A State-of-The-Art Review, in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 5, N. 4, pp. 29-64
-
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
, vol.5
, Issue.4
, pp. 29-64
-
-
Baddar, A.-H.1
Merlo, A.2
Migliardi, M.3
|