-
1
-
-
84978035433
-
Trust management using probabilistic energy-aware monitoring for intrusion detection in mobile Ad-Hoc networks
-
A. Lupia and F. D. Rango, "Trust management using probabilistic energy-aware monitoring for intrusion detection in mobile ad-hoc networks," in Proc. 2016 Wireless Telecommunications Symposium (WTS), pp. 1-6, 2016.
-
(2016)
Proc. 2016 Wireless Telecommunications Symposium (WTS)
, pp. 1-6
-
-
Lupia, A.1
Rango, F.D.2
-
2
-
-
84971577117
-
Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization
-
C. Fachkha and M. Debbabi, "Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization," IEEE Comm. Surveys & Tutorials, Vol. 18, no. 2, pp. 1197-1227, 2016.
-
(2016)
IEEE Comm. Surveys & Tutorials
, vol.18
, Issue.2
, pp. 1197-1227
-
-
Fachkha, C.1
Debbabi, M.2
-
3
-
-
84874959990
-
Effect of intrusion detection and response on reliability of cyber physical systems
-
R. Mitchell and I.-R. Chen, "Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems," IEEE Trans. Reliability, Vol. 62, no. 1, pp. 199-210, 2013.
-
(2013)
IEEE Trans. Reliability
, vol.62
, Issue.1
, pp. 199-210
-
-
Mitchell, R.1
Chen, I.-R.2
-
4
-
-
84893369822
-
Firewall policy reconnaissance: Techniques and analysis
-
M. Q. Ali, E. Al-Shaer and T. Samak, "Firewall Policy Reconnaissance: Techniques and Analysis," IEEE Trans. Information Forensics and Security, Vol. 9, no. 2, pp. 296-308, 2014.
-
(2014)
IEEE Trans. Information Forensics and Security
, vol.9
, Issue.2
, pp. 296-308
-
-
Ali, M.Q.1
Al-Shaer, E.2
Samak, T.3
-
5
-
-
84863242123
-
Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems
-
C.-Y. Ho, Y.-C. Lai, I.-W. Chen, F.-Y. Wang and W.-H. Tai, "Statistical Analysis of False Positives and False Negatives from Real Traffic with Intrusion Detection/Prevention Systems," IEEE Communications Mag., Vol. 50, no. 3, pp. 146-154, 2012.
-
(2012)
IEEE Communications Mag.
, vol.50
, Issue.3
, pp. 146-154
-
-
Ho, C.-Y.1
Lai, Y.-C.2
Chen, I.-W.3
Wang, F.-Y.4
Tai, W.-H.5
-
6
-
-
84868118751
-
A real-time NetFlow-based intrusion detection system with improved BBNN and high-frequency field programmable gate arrays
-
Q. A. Tran, F. Jiang and J. Hu, "A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays," in Proc. the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 201-208, 2012.
-
(2012)
Proc. The 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 201-208
-
-
Tran, Q.A.1
Jiang, F.2
Hu, J.3
-
7
-
-
84962069902
-
Web server protection against application layer DDoS attacks using machine learning and traffic authentication
-
J. D. Ndibwile, A. Govardhan, K. Okada and Y. Kadobayashi, "Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic Authentication," in Proc. 2015 IEEE 39th Annual Computer Software and Applications Conference, Vol. 3, pp. 261-267, 2015.
-
(2015)
Proc. 2015 IEEE 39th Annual Computer Software and Applications Conference
, vol.3
, pp. 261-267
-
-
Ndibwile, J.D.1
Govardhan, A.2
Okada, K.3
Kadobayashi, Y.4
-
9
-
-
85017003312
-
-
Sept. 11
-
Palo Alto Networks, "PAN-OS Administrator's Guide," https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/monitoring/disable-hardware-offload, (Sept. 11, 2016).
-
(2016)
PAN-OS Administrator's Guide
-
-
-
11
-
-
84988891952
-
RCA on FPGAs designed by the RTL design methodology and wave-pipelined operation
-
T. Sato, S. Chivapreecha, P. Moungnoul and K. Higuchi, "RCA on FPGAs Designed by the RTL Design Methodology and Wave-Pipelined Operation," Proc. of ECTI-CON 21016, pp. 1251.1-1251.6, 2016.
-
(2016)
Proc. of ECTI-CON 21016
, pp. 12511-12516
-
-
Sato, T.1
Chivapreecha, S.2
Moungnoul, P.3
Higuchi, K.4
|