-
1
-
-
0040749982
-
Cooperating security managers: Distributed intrusion detection systems
-
G. White and V. Pooch, "Cooperating security managers: Distributed intrusion detection systems," Computers &Security, vol. 15, pp. 441-450, 1996
-
(1996)
Computers &Security
, vol.15
, pp. 441-450
-
-
White, G.1
Pooch, V.2
-
2
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
C. V. Zhou, C. Leckie, and S. Karunasekera, "A survey of coordinated attacks and collaborative intrusion detection," Computers &Security, vol. 29, pp. 124-140, 2010
-
(2010)
Computers &Security
, vol.29
, pp. 124-140
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
-
3
-
-
70350716910
-
The intrusion detection message exchange format (IDMEF)
-
H. Debar, H. Curry, and D. Feinstein, "The Intrusion Detection Message Exchange Format (IDMEF)," Internet Engineering Task Force , IETF, vol. RFC 4765 (Experimental), 2007
-
(2007)
Internet Engineering Task Force , IETF, Vol RFC 4765 (Experimental)
-
-
Debar, H.1
Curry, H.2
Feinstein, D.3
-
5
-
-
84944738739
-
Collaborative intrusion detection system (CIDS): A framework for accurate and efficient IDS
-
W. Yu-Sung, B. Foo, M. Yongguo, and S. Bagchi, "Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS," in Computer Security Applications Conference, 2003. Proceedings. 19th Annual, 2003, pp. 234-244
-
(2003)
Computer Security Applications Conference, 2003. Proceedings. 19th Annual
, pp. 234-244
-
-
Yu-Sung, W.1
Foo, B.2
Yongguo, M.3
Bagchi, S.4
-
6
-
-
84857574309
-
DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments
-
S. T. Zargar, H. Takabi, and J. B. D. Joshi, "DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments," in Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, 2011, pp. 332-341
-
(2011)
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on
, pp. 332-341
-
-
Zargar, S.T.1
Takabi, H.2
Joshi, J.B.D.3
-
8
-
-
80052784450
-
Performance analysis in intrusion detection and prevention systems
-
K. Alsubhi, N. Bouabdallah, and R. Boutaba, "Performance analysis in Intrusion Detection and Prevention Systems," in Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium on, 2011, pp. 369-376
-
(2011)
Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium on
, pp. 369-376
-
-
Alsubhi, K.1
Bouabdallah, N.2
Boutaba, R.3
-
9
-
-
84855735622
-
SMURFEN: A system framework for rule sharing collaborative intrusion detection
-
C. Fung, Z. Quanyan, R. Boutaba, and T. Basar, "SMURFEN: A system framework for rule sharing collaborative intrusion detection," in Network and Service Management (CNSM), 2011 7th International Conference on, 2011, pp. 1-6
-
(2011)
Network and Service Management (CNSM), 2011 7th International Conference on
, pp. 1-6
-
-
Fung, C.1
Quanyan, Z.2
Boutaba, R.3
Basar, T.4
-
11
-
-
77957824022
-
Network security configurations: A nonzero-sum stochastic game approach
-
Q. Zhu, H. Tembine, and T. Basar, "Network security configurations: A nonzero-sum stochastic game approach," in American Control Conference (ACC), 2010, 2010, pp. 1059-1064
-
(2010)
American Control Conference (ACC), 2010
, pp. 1059-1064
-
-
Zhu, Q.1
Tembine, H.2
Basar, T.3
-
12
-
-
84874284297
-
Game theory meets network security and privacy
-
M. H. Manshaei, Q. Zhu, T. Alpcan, T. Bacár, and J.-P. Hubaux, "Game theory meets network security and privacy," ACM Computing Surveys (CSUR), vol. 45, p. 25, 2013
-
(2013)
ACM Computing Surveys (CSUR)
, vol.45
, pp. 25
-
-
Manshaei, M.H.1
Zhu, Q.2
Alpcan, T.3
Bacár, T.4
Hubaux, J.-P.5
-
13
-
-
76949106169
-
A puzzle-based defense strategy against flooding attacks using game theory
-
M. S. Fallah, "A puzzle-based defense strategy against flooding attacks using game theory," Dependable and Secure Computing, IEEE Transactions on, vol. 7, pp. 5-19, 2010
-
(2010)
Dependable and Secure Computing, IEEE Transactions on
, vol.7
, pp. 5-19
-
-
Fallah, M.S.1
-
14
-
-
84930153452
-
Taxonomy and survey of collaborative intrusion detection
-
E. Vasilomanolakis, S. Karuppayah, M. Mühlhäuser, and M. Fischer, "Taxonomy and Survey of Collaborative Intrusion Detection," ACM Computing Surveys (CSUR), vol. 47, p. 55, 2015
-
(2015)
ACM Computing Surveys (CSUR)
, vol.47
, pp. 55
-
-
Vasilomanolakis, E.1
Karuppayah, S.2
Mühlhäuser, M.3
Fischer, M.4
-
16
-
-
33745469273
-
Towards collaborative security and P2P intrusion detection
-
M. E. Locasto, J. J. Parekh, A. D. Keromytis, and S. J. Stolfo, "Towards collaborative security and P2P intrusion detection," in Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth Annual IEEE SMC, 2005, pp. 333-339
-
(2005)
Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth Annual IEEE SMC
, pp. 333-339
-
-
Locasto, M.E.1
Parekh, J.J.2
Keromytis, A.D.3
Stolfo, S.J.4
-
17
-
-
27544444562
-
A reputation-based trust mechanism for ad hoc networks
-
Y. Rebahi, V. E. Mujica, and D. Sisalem, "A reputation-based trust mechanism for ad hoc networks," in Computers and Communications, 2005. ISCC 2005. Proceedings. 10th IEEE Symposium on, 2005, pp. 37-42
-
(2005)
Computers and Communications, 2005. ISCC 2005. Proceedings. 10th IEEE Symposium on
, pp. 37-42
-
-
Rebahi, Y.1
Mujica, V.E.2
Sisalem, D.3
-
18
-
-
84900619220
-
Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: Feasibility and challenges
-
L. Wenjuan, M. Yuxin, and K. Lam-for, "Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges," in Computational Intelligence and Security (CIS), 2013 9th International Conference on, 2013, pp. 518-522
-
(2013)
Computational Intelligence and Security (CIS), 2013 9th International Conference on
, pp. 518-522
-
-
Wenjuan, L.1
Yuxin, M.2
Lam-For, K.3
-
19
-
-
0037105912
-
Intrusion detection with mobile agents
-
W. A. Jansen, "Intrusion detection with mobile agents," Computer Communications, vol. 25, pp. 1392-1401, 2002
-
(2002)
Computer Communications
, vol.25
, pp. 1392-1401
-
-
Jansen, W.A.1
-
20
-
-
79958778609
-
Dirichlet-based trust management for effective collaborative intrusion detection networks
-
C. J. Fung, J. Zhang, I. Aib, and R. Boutaba, "Dirichlet-based trust management for effective collaborative intrusion detection networks," Network and Service Management, IEEE Transactions on, vol. 8, pp. 79-91, 2011
-
(2011)
Network and Service Management, IEEE Transactions on
, vol.8
, pp. 79-91
-
-
Fung, C.J.1
Zhang, J.2
Aib, I.3
Boutaba, R.4
-
21
-
-
84908539831
-
An improved distributed intrusion detection architecture for cloud computing
-
ed: Springer
-
H. R. Ghorbani and M. R. Hashemi, "An Improved Distributed Intrusion Detection Architecture for Cloud Computing," in Computer Networks and Distributed Systems, ed: Springer, 2014, pp. 105-116
-
(2014)
Computer Networks and Distributed Systems
, pp. 105-116
-
-
Ghorbani, H.R.1
Hashemi, M.R.2
-
22
-
-
78649815408
-
A cooperative intrusion detection system framework for cloud computing networks
-
C.-C. Lo, C.-C. Huang, and J. Ku, "A cooperative intrusion detection system framework for cloud computing networks," in Parallel processing workshops (ICPPW), 2010 39th international conference on, 2010, pp. 280-284
-
(2010)
Parallel Processing Workshops (ICPPW), 2010 39th International Conference on
, pp. 280-284
-
-
Lo, C.-C.1
Huang, C.-C.2
Ku, J.3
-
24
-
-
79951617988
-
Effective acquaintance management for collaborative intrusion detection networks
-
C. J. Fung, J. Zhang, and R. Boutaba, "Effective acquaintance management for collaborative intrusion detection networks," in Network and Service Management (CNSM), 2010 International Conference on, 2010, pp. 158-165
-
(2010)
Network and Service Management (CNSM), 2010 International Conference on
, pp. 158-165
-
-
Fung, C.J.1
Zhang, J.2
Boutaba, R.3
-
26
-
-
1142278701
-
Equilibrium points of stochastic non-cooperative $ n $-person games
-
M. Takahashi, "Equilibrium points of stochastic non-cooperative $ n $-person games," Journal of Science of the Hiroshima University, Series AI (Mathematics), vol. 28, pp. 95-99, 1964
-
(1964)
Journal of Science of the Hiroshima University, Series AI (Mathematics)
, vol.28
, pp. 95-99
-
-
Takahashi, M.1
-
27
-
-
84972535636
-
Equilibrium in a stochastic $ n $-person game
-
A. M. Fink, "Equilibrium in a stochastic $ n $-person game," Journal of Science of the Hiroshima University, Series AI (Mathematics), vol. 28, pp. 89-93, 1964
-
(1964)
Journal of Science of the Hiroshima University, Series AI (Mathematics)
, vol.28
, pp. 89-93
-
-
Fink, A.M.1
|