A Survey on Mobile Agent based Intrusion Detection System
暂无分享,去创建一个
[1] Wendi Heinzelman,et al. Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .
[2] Amira Hamdi Shabaan,et al. Intrusion detection system in wireless ad-hoc networks based on mobile agent technology , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[3] Chundong Wang,et al. A Distributed Intrusion Detection System Based on Mobile Agents , 2009, 2009 2nd International Conference on Biomedical Engineering and Informatics.
[4] Jing Xu,et al. A New Distributed Intrusion Detection Model Based on Immune Mobile Agent , 2009, 2009 Asia-Pacific Conference on Information Processing.
[5] Henda Ben Ghezala,et al. A distributed multi-level anomalies detection system using the mobile agent approach , 2009, 2009 Global Information Infrastructure Symposium.
[6] Stefan Fünfrocken,et al. Integrating Java-based mobile agents into Web servers under security concerns , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[7] Abolfazl Esfandi. Efficient anomaly intrusion detection system in adhoc networks by mobile agents , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[8] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.
[9] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[10] Wayne Jansen,et al. Applying Mobile Agents to Intrusion Detection and Response , 1999 .
[11] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[12] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[13] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[14] K. Ghedira,et al. MA_IDS : Mobile Agents for Intrusion Detection System , 2009, 2009 IEEE International Advance Computing Conference.
[15] Raman K. Mehra,et al. Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks , 2008, Inf. Fusion.
[16] Khaled Ghédira,et al. Distributed Agent Architecture for Intrusion Detection Based on New Metrics , 2009, 2009 Third International Conference on Network and System Security.
[17] Abolfazl Esfandi,et al. Mobile agent security in multi agent environments using a multi agent-multi key approach , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[18] K. Boudaoud,et al. Détection d'intrusions : une nouvelle approche par systèmes multi-agents , 2001 .
[19] A HofmeyrSteven,et al. Intrusion detection using sequences of system calls , 1998 .
[20] Joseph P. Macker,et al. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.