Ubiquitous Networking

s of Keynote Talks 5G is Just Around the Corner; So What is Next?

[1]  Won Hyung Park,et al.  Performance Comparison and Detection Analysis in Snort and Suricata Environment , 2017, Wirel. Pers. Commun..

[2]  Ehab Al-Shaer,et al.  Alert prioritization in Intrusion Detection Systems , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.

[3]  Lucas M. Venter,et al.  A comparison of Intrusion Detection systems , 2001, Comput. Secur..

[4]  Khaled Salah,et al.  Performance evaluation comparison of Snort NIDS under Linux and Windows Server , 2010, J. Netw. Comput. Appl..

[5]  Robert Ivor John,et al.  A comparative study of different fuzzy classifiers for Cloud Intrusion Detection Systems' alerts , 2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI).

[6]  Chris Clifton,et al.  Developing custom intrusion detection filters using data mining , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).

[7]  Alfonso Valdes,et al.  A Mission-Impact-Based Approach to INFOSEC Alarm Correlation , 2002, RAID.

[8]  Maxwell G. Dondo,et al.  A Vulnerability Prioritization System Using A Fuzzy Risk Analysis Approach , 2008, SEC.

[9]  Jeanna Neefe Matthews,et al.  Quantitative analysis of intrusion detection systems: Snort and Suricata , 2013, Defense, Security, and Sensing.

[10]  Barry Irwin,et al.  Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope , 2007, VizSEC.

[11]  Wenke Lee,et al.  Statistical Causality Analysis of INFOSEC Alert Data , 2003, RAID.

[12]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[13]  Nor Badrul Anuar,et al.  A risk index model for security incident prioritisation , 2011 .

[14]  Eugene Albin A Comparative Analysis of the Snort and Suricata Intrusion-Detection Systems , 2011 .

[15]  Eric Eide,et al.  Scientific Infrastructure for Advancing Cloud Architectures and Applications , 2014 .

[16]  Y. V. Ramana Reddy,et al.  TRINETR: an intrusion detection alert management systems , 2004, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[17]  Neil C. Rowe,et al.  A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[18]  Song Guo,et al.  Can We Beat DDoS Attacks in Clouds? , 2014, IEEE Transactions on Parallel and Distributed Systems.

[19]  Keith Phalp,et al.  Exploring discrepancies in findings obtained with the KDD Cup '99 data set , 2011, Intell. Data Anal..

[20]  Abdellah Ezzati,et al.  A novel architecture for task scheduling based on Dynamic Queues and Particle Swarm Optimization in cloud computing , 2016, 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech).

[21]  Rajkumar Buyya,et al.  CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..

[22]  Rajkumar Buyya,et al.  A Negotiation Mechanism for Advance Resource Reservations Using the Alternate Offers Protocol , 2008, 2008 16th Interntional Workshop on Quality of Service.

[23]  Youness Idrissi Khamlichi,et al.  Handling alerts for intrusion detection system using stateful pattern matching , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).