-
1
-
-
0035402083
-
Netcamo: Camouflaging network traffic for QoS-guaranteed critical allplications
-
July
-
Y. Guan, X. Fu, D. Xuan, P.U. Shenoy, R. Bettati, and W. Zhao. "Netcamo: Camouflaging network traffic for QoS-guaranteed critical allplications." IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, Special Issue on Information Assurance, vol. 31, issue 4, pp. 253-265, July 2001.
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, Special Issue on Information Assurance
, vol.31
, Issue.4
, pp. 253-265
-
-
Guan, Y.1
Fu, X.2
Xuan, D.3
Shenoy, P.U.4
Bettati, R.5
Zhao, W.6
-
2
-
-
0024621174
-
On estimation of entropy and mutual information of continuous distributions
-
R. Moddemeijer. "On estimation of entropy and mutual information of continuous distributions." Signal Processing, vol.16, no.3, pp. 233-246, 1989.
-
(1989)
Signal Processing
, vol.16
, Issue.3
, pp. 233-246
-
-
Moddemeijer, R.1
-
4
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues and open problems
-
J. Raymond. "Traffic analysis: Protocols, attacks, design issues and open problems." Designing Privacy Enhancing Technologies (LNCS), vol.2009, pp. 10-29, 2001.
-
(2001)
Designing Privacy Enhancing Technologies (LNCS)
, vol.2009
, pp. 10-29
-
-
Raymond, J.1
-
6
-
-
84861391306
-
Describing and modeling of video-on-demand service with the usage of multi-layer graph
-
Lviv-Slavske
-
D. Ageyev and A. Ignatenko, "Describing and modeling of video-on-demand service with the usage of multi-layer graph," Proceedings of International Conference on Modern Problem of Radio Engineering, Telecommunications and Computer Science, Lviv-Slavske, 2012, pp. 340-341.
-
(2012)
Proceedings of International Conference on Modern Problem of Radio Engineering, Telecommunications and Computer Science
, pp. 340-341
-
-
Ageyev, D.1
Ignatenko, A.2
-
9
-
-
56549094242
-
A multi-sensor model to improve automated attack detection
-
M. Almgren, U. Lindqvist, and E. Jonsson, "A multi-sensor model to improve automated attack detection," in Proceedings of 11th International Symposium (Raid'2008) Recent Advances in Intrusion Detection, vol. 5230, pp. 291-310, 2008.
-
(2008)
Proceedings of 11th International Symposium (Raid'2008) Recent Advances in Intrusion Detection
, vol.5230
, pp. 291-310
-
-
Almgren, M.1
Lindqvist, U.2
Jonsson, E.3
-
10
-
-
68049121093
-
Anomaly detection: A survey
-
V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Computing Surveys, vol. 41, no. 3, 2009, pp. 1-58.
-
(2009)
ACM Computing Surveys
, vol.41
, Issue.3
, pp. 1-58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
11
-
-
72849153369
-
Combining multiple intrusion detection and response technologies in an active networking based architecture
-
A. Hess, M. Jung, and G. Schafer, "Combining multiple intrusion detection and response technologies in an active networking based architecture," DFN-Arbeitstagung uber Kommunikationsnetze, pp. 153-165, 2003.
-
(2003)
DFN-Arbeitstagung Uber Kommunikationsnetze
, pp. 153-165
-
-
Hess, A.1
Jung, M.2
Schafer, G.3
-
13
-
-
33947692292
-
Analysis of active intrusion prevention data for predicting hostile activity in computer networks
-
I. Green, T. Raz, and M. Zviran, "Analysis of active intrusion prevention data for predicting hostile activity in computer networks," Communications of the ACM, vol. 50, pp. 63-68, 2007.
-
(2007)
Communications of the ACM
, vol.50
, pp. 63-68
-
-
Green, I.1
Raz, T.2
Zviran, M.3
-
15
-
-
34848927600
-
-
New York, USA: Springer-Verlag
-
C. Kruegel, F. Valeur, and G. Vigna. Intrusion Detection and Correlation: Challenges and Solutions. New York, USA: Springer-Verlag, vol. 14, 2005.
-
(2005)
Intrusion Detection and Correlation: Challenges and Solutions
, vol.14
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
-
17
-
-
49949086459
-
Refacing: An autonomic approach to network security based on multidimensional trustworthiness
-
F. Oliviero, L. Peluso, and S. Romano, "Refacing: An autonomic approach to network security based on multidimensional trustworthiness," Computer Networks, vol. 52, no. 14, pp. 2745-2763, 2008.
-
(2008)
Computer Networks
, vol.52
, Issue.14
, pp. 2745-2763
-
-
Oliviero, F.1
Peluso, L.2
Romano, S.3
-
19
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. Sharif, "Misleading worm signature generators using deliberate noise injection," in Proceedings of IEEE Symposium on Security and Privacy, Washington, DC, USA: IEEE Computer Society, 2006, pp. 17-31.
-
(2006)
Proceedings of IEEE Symposium on Security and Privacy, Washington, DC, USA: IEEE Computer Society
, pp. 17-31
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
20
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, "Bro: a system for detecting network intruders in real-time," Computer Networks, vol. 31, pp. 2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
22
-
-
21644443817
-
Automatic generation and analysis of nids attacks
-
S. Rubin, S. Jha, and B.P. Miller. "Automatic generation and analysis of nids attacks," in Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC '04), IEEE Computer Society, 2004, pp. 28-38.
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC '04) IEEE Computer Society
, pp. 28-38
-
-
Rubin, S.1
Jha, S.2
Miller, B.P.3
|