Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes
暂无分享,去创建一个
Michal Pechoucek | Martin Rehák | Martin Grill | Karel Bartos | Pavel Celeda | Vojtech Krmicek | M. Pechoucek | M. Rehák | Pavel Čeleda | Vojtech Krmicek | Martin Grill | Karel Bartos
[1] Michal Pechoucek,et al. Trust-Based Classifier Combination for Network Anomaly Detection , 2008, CIA.
[2] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[3] Sarvapali D. Ramchurn,et al. Trust in multi-agent systems , 2004, The Knowledge Engineering Review.
[4] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[5] Sarvapali D. Ramchurn,et al. Trust in Multiagent Systems , 2004 .
[6] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[7] Zhi-Li Zhang,et al. Reducing Unwanted Traffic in a Backbone Network , 2005, SRUTI.
[8] Stephen Northcutt,et al. Network Intrusion Detection: An Analyst's Hand-book , 1999 .
[9] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[10] Christophe Diot,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM.
[11] Michal Pechoucek,et al. Trust Modeling with Context Representation and Generalized Identities , 2007, CIA.
[12] Achim Rettinger,et al. Learning Initial Trust Among Interacting Agents , 2007, CIA.
[13] Jordi Sabater-Mir,et al. Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.
[14] M. Pechoucek,et al. Network Intrusion Detection by Means of Community of Trusting Agents , 2007, 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'07).