Internet security and intrusion detection
Proceedings of the 25th International Conference on Software Engineering
Policies for sharing distributed probabilistic beliefs
ACSC '03 Proceedings of the 26th Australasian computer science conference - Volume 16
Managing IT in government business & communities
A formal approach to sensor placement and configuration in a network intrusion detection system
Proceedings of the 2006 international workshop on Software engineering for secure systems
Mitigating denial of service attacks: a tutorial
Journal of Computer Security
Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Detecting Denial-of-Service attacks using the wavelet transform
Computer Communications
Rule generalisation in intrusion detection systems using SNORT
International Journal of Electronic Security and Digital Forensics
CAMNEP: agent-based network intrusion detection system
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems: industrial track
Detecting Intrusions in Agent System by Means of Exception Handling
HoloMAS '07 Proceedings of the 3rd international conference on Industrial Applications of Holonic and Multi-Agent Systems: Holonic and Multi-Agent Systems for Manufacturing
High-Performance Agent System for Intrusion Detection in Backbone Networks
CIA '07 Proceedings of the 11th international workshop on Cooperative Information Agents XI
Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes
International Journal of Electronic Security and Digital Forensics
Proactive attacker localization in wireless LAN
ACM SIGCOMM Computer Communication Review
Implementing IDS Management on Lock-Keeper
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Dynamic information source selection for intrusion detection systems
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Proactive attacker localization in WLAN
ACM SIGMOBILE Mobile Computing and Communications Review
Crossbow: a vertically integrated QoS stack
Proceedings of the 1st ACM workshop on Research on enterprise networking
ICWE'03 Proceedings of the 2003 international conference on Web engineering
Intrusion detection in computer networks with neural and fuzzy classifiers
ICANN/ICONIP'03 Proceedings of the 2003 joint international conference on Artificial neural networks and neural information processing
Intrusion Detection by Ellipsoid Boundary
Journal of Network and Systems Management
A new alert correlation algorithm based on attack graph
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
An automatic intrusion diagnosis approach for clouds
International Journal of Automation and Computing
Towards filtering and alerting rule rewriting on single-component policies
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Real-time intrusion detection in ubiquitous networks with a string-based approach
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Analysis of policy anomalies on distributed network security setups
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Optimizing a radial layout of bipartite graphs for a tool visualizing security alerts
GD'11 Proceedings of the 19th international conference on Graph Drawing
An alert correlation platform for memory-supported techniques
Concurrency and Computation: Practice & Experience
A novel intrusion severity analysis approach for Clouds
Future Generation Computer Systems
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Protecting grids from cross-domain attacks using security alert sharing mechanisms
Future Generation Computer Systems
Infinite Dirichlet mixture models learning via expectation propagation
Advances in Data Analysis and Classification
Hi-index | 0.00 |
From the Publisher:Written to be both a training aid and a technical reference for intrusion detection analysts, Northcutt's book contains practical experience that can't be found anywhere else. With detailed explanations and illustrative examples from his own career, Northcutt covers the topic completely, from detect evaluation, analysis, and situation handling, through the theories involved in understanding hackers, intelligence gathering, and coordinated attacks, to an arsenal of preventive and aggressive security measures.