Analysis of an algorithm for distributed recognition and accountability
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Holding intruders accountable on the Internet
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Intrusion detection for distributed applications
Communications of the ACM
Discussion: strike back: offensive actions in information warfare
Proceedings of the 1999 workshop on New security paradigms
Data dependency based logging for defensive information warfare
SAC '00 Proceedings of the 2000 ACM symposium on Applied computing - Volume 1
Detection and Protection Against Network Scanning: IEDP
ICCNMC '01 Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC'01)
Multi-Agent based Intrusion Detection Architecture
ICCNMC '01 Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC'01)
Forensic feature extraction and cross-drive analysis
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Two-stage database intrusion detection by combining multiple evidence and belief update
Information Systems Frontiers
Hi-index | 48.23 |