Cyberspace Safety and Security
暂无分享,去创建一个
[1] Wenjuan Li,et al. Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks , 2014, IFIPTM.
[2] Ji Guo,et al. A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[3] Hao Wang,et al. Privacy-preserving anomaly detection across multi-domain networks , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.
[4] Nahid Shahmehri,et al. A Trust-Aware, P2P-Based Overlay for Intrusion Detection , 2006, 17th International Workshop on Database and Expert Systems Applications (DEXA'06).
[5] Raouf Boutaba,et al. Robust and scalable trust management for collaborative intrusion detection , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management.
[6] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[7] Lam-for Kwok,et al. Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection , 2013, Int. J. Comput. Intell. Syst..
[8] Sushil Jajodia,et al. Profiling Online Social Behaviors for Compromised Account Detection , 2016, IEEE Transactions on Information Forensics and Security.
[9] Yan Chen,et al. Towards scalable and robust distributed intrusion alert fusion with good load balancing , 2006, LSAD '06.
[10] Patricia A. H. Williams,et al. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem , 2015, Medical devices.
[11] Saurabh Bagchi,et al. Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[12] Raouf Boutaba,et al. Trust Management for Host-Based Collaborative Intrusion Detection , 2008, DSOM.
[13] Wenjuan Li,et al. Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection , 2015, Secur. Commun. Networks.
[14] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[15] Wenjuan Li,et al. Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection , 2013, NSS.
[16] Wenjuan Li,et al. EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism , 2014, Comput. Secur..
[17] Wenjuan Li,et al. Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[18] Yan Li,et al. Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[19] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[20] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[21] Wenjuan Li,et al. SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks , 2017, GPC.
[22] Nur Izura Udzir,et al. A Cloud-based Intrusion Detection Service framework , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[23] Horace Ho-Shing Ip,et al. PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks , 2016, NSS.
[24] Kim-Kwang Raymond Choo,et al. A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks , 2017, J. Netw. Comput. Appl..
[25] Wenjuan Li,et al. Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection , 2012, SecureComm.
[26] Lam-for Kwok,et al. Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection , 2014, J. Netw. Comput. Appl..
[27] Horace Ho-Shing Ip,et al. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model , 2017, J. Netw. Comput. Appl..