Abstraction-based intrusion detection in distributed environments
ACM Transactions on Information and System Security (TISSEC)
ACM fellow profile: Eugene H. Spafford
ACM SIGSOFT Software Engineering Notes
Capture of an intruder by mobile agents
Proceedings of the fourteenth annual ACM symposium on Parallel algorithms and architectures
Using internal sensors and embedded detectors for intrusion detection
Journal of Computer Security
A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Randomly roving agents for intrusion detection
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Security applications of peer-to-peer networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A novel distributed intrusion detection model based on mobile agent
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Description of bad-signatures for network intrusion detection
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Information sharing for distributed intrusion detection systems
Journal of Network and Computer Applications
D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Collaborating against common enemies
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Coalitions of malicious intelligent agents
International Journal of Web Engineering and Technology
Balancing intrusion detection resources in ubiquitous computing networks
Computer Communications
On Some Method for Intrusion Detection Used by the Multi-agent Monitoring System
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
Traffic Data Preparation for a Hybrid Network IDS
HAIS '08 Proceedings of the 3rd international workshop on Hybrid Artificial Intelligence Systems
A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02
Using Artificial Intelligence for Intrusion Detection
Proceedings of the 2007 conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies
ODISET: On-line distributed session tracing using agents
IJCAI'03 Proceedings of the 18th international joint conference on Artificial intelligence
TRINETR: An architecture for collaborative intrusion detection and knowledge-based alert evaluation
Advanced Engineering Informatics
Collaborative architecture for distributed intrusion detection system
CISDA'09 Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications
Towards the automatic generation of mobile agents for distributed intrusion detection system
Journal of Systems and Software
Content-based methodology for anomaly detection on the web
AWIC'03 Proceedings of the 1st international Atlantic web intelligence conference on Advances in web intelligence
A multi-agent system for computer network security monitoring
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
A Snort-based agent for a JADE multi-agent intrusion detection system
International Journal of Intelligent Information and Database Systems
A new distributed intrusion detection method based on immune mobile agent
LSMS/ICSEE'10 Proceedings of the 2010 international conference on Life system modeling and and intelligent computing, and 2010 international conference on Intelligent computing for sustainable energy and environment: Part I
The use of artificial intelligence based techniques for intrusion detection: a review
Artificial Intelligence Review
A log analyzer agent for intrusion detection in a multi-agent system
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part I
Decontamination of chordal rings and tori
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
BotGrep: finding P2P bots with structured graph analysis
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Effective multimodel anomaly detection using cooperative negotiation
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Distributed security algorithms by mobile agents
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
A robust SNMP based infrastructure for intrusion detection and response in tactical MANETs
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Agent-based distributed intrusion alert system
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
An intelligent agent-based framework for collaborative information security
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
A novel distributed intrusion detection architecture based on overlay multicasting
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Collaborative anomaly-based detection of large-scale internet attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mobile agents for network intrusion resistance
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Alert correlation analysis in intrusion detection
ADMA'06 Proceedings of the Second international conference on Advanced Data Mining and Applications
Design and implementation of survivable network systems
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
Enhancing the accuracy of network-based intrusion detection with host-based context
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Boundary-Optimal triangulation flooding
ISAAC'04 Proceedings of the 15th international conference on Algorithms and Computation
Incorporating temporal constraints in the planning task of a hybrid intelligent IDS
HAIS'10 Proceedings of the 5th international conference on Hybrid Artificial Intelligence Systems - Volume Part II
A model for detecting "global footprint anomalies" in a grid environment
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
HTTPHunting: an IBR approach to filtering dangerous HTTP Traffic
ICDM'06 Proceedings of the 6th Industrial Conference on Data Mining conference on Advances in Data Mining: applications in Medicine, Web Mining, Marketing, Image and Signal Mining
An alert data mining framework for network-based intrusion detection system
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Towards a multiagent-based distributed intrusion detection system using data mining approaches
ADMI'11 Proceedings of the 7th international conference on Agents and Data Mining Interaction
Design and implementation of a decentralized prototype system for detecting distributed attacks
Computer Communications
Intrusion Detection: Characterising intrusion detection sensors
Network Security
RT-MOVICAB-IDS: Addressing real-time intrusion detection
Future Generation Computer Systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Cooperative Intrusion Detection Model Based on Granular Computing and Agent Technologies
International Journal of Agent Technologies and Systems
Hi-index | 0.00 |