Fault Detection for Byzantine Quorum Systems
IEEE Transactions on Parallel and Distributed Systems
Taming the Internet for eBusiness Use
BT Technology Journal
Journal of Network and Systems Management
Toward cost-sensitive modeling for intrusion detection and response
Journal of Computer Security
Mining system audit data: opportunities and challenges
ACM SIGMOD Record
DEVS Simulation of distributed intrusion detection systems
Transactions of the Society for Computer Simulation International - Recent advances in DEVS Methodology--part I
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Modeling and Simulation for Detecting a Distributed Denial of Service Attack
AI '02 Proceedings of the 15th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Network Security Modeling and Cyber Attack Simulation Methodology
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Simulation of Network Security with Collaboration among IDS Models
AI '01 Proceedings of the 14th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
SECUSIM: A Tool for the Cyber-Attack Simulation
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A Distributed Dynamic µFirewall Architecture with Mobile Agents and KeyNote Trust Management System
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
NSDF: a computer network system description framework and its application to network security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Aspects of adaptive reconfiguration in a scalable intrusion tolerant system
Complexity - Special issue: Resilient and adaptive defense of computing networks
Security analysis of SITAR intrusion tolerance system
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label
The Journal of Supercomputing
Catching spam before it arrives: domain specific dynamic blacklists
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
ANSS '06 Proceedings of the 39th annual Symposium on Simulation
Intrusion detection using a fuzzy genetics-based learning algorithm
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
A model of the behavior of network objects in distributed computer systems
Programming and Computing Software
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
International Journal of Information and Computer Security
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
Intrusion Detection by Ellipsoid Boundary
Journal of Network and Systems Management
Probability principle of a reliable approach to detect signs of DDOS flood attacks
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Automated cyber-attack scenario generation using the symbolic simulation
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Linux-Based system modelling for cyber-attack simulation
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
An electronic reconfigurable neural architecture for intrusion detection
IWINAC'05 Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II
Hi-index | 0.00 |
From the Publisher:The proliferation of cracking activity on the Internet has led to astounding developments in intrusion detection technology. This book will lead you through the details and methodologies associated with this important type of security protection. System administrators, programmers, system and software engineers, and managers of technology will find this book invaluable. And anyone associated with information assurance for critical infrastructures will learn how intrusion detection can be applied to their unique security needs. With this book, you will learn about intrusion detection topics including: Commercial tools for intrusion detection Strategies for processing security audit trails Correlation techniques and algorithms Intruder trace back techniques Deception-based honey pots and traps Incident response and disaster recovery