Study of Intrusion Detection Systems
暂无分享,去创建一个
Huang | Hwang | Li-Chin | Min-Shiang
[1] Andrés Marín López,et al. Enhancing privacy and dynamic federation in IdM for consumer cloud computing , 2012, IEEE Transactions on Consumer Electronics.
[2] Li-Yong Ren,et al. Using data mining to discover signatures in network-based intrusion detection , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.
[3] Wei-Pang Yang,et al. A two-phase encryption scheme for enhancing database security , 1995, J. Syst. Softw..
[4] Celia Li,et al. Secure Routing for Wireless Mesh Networks , 2011, Int. J. Netw. Secur..
[5] Ya-Fen Chang,et al. An Improved User Authentication and Key Agreement Scheme Providing User Anonymity , 2011 .
[6] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[7] You,et al. Research and Development of P2P Worms , 2011 .
[8] Zhou,et al. An Enhanced Automated Signature Generation Algorithm for Polymorphic Malware Detection , 2010 .
[9] Xenofontas A. Dimitropoulos,et al. Creating realistic BGP models , 2003, 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, 2003. MASCOTS 2003..
[10] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[11] Mohammad,et al. A Learning Automata Based Area Coverage Algorithm for Wireless Sensor Networks , 2010 .
[12] Hiang H Wang. Secure Access Schemes in Mobile Database Systems , 2012 .
[13] Wei-Pang Yang,et al. Multilevel Secure Database Encryption with Subkeys , 1997, Data Knowl. Eng..
[14] Li Lin,et al. Balancing Trust and Incentive in Peer-to-Peer Collaborative System , 2007, Int. J. Netw. Secur..
[15] Cheng-Chi Lee,et al. A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography , 2005, Telecommun. Syst..
[16] Mohamed Salah Bouassida. Authentication vs. Privacy within Vehicular Ad Hoc Networks , 2011, Int. J. Netw. Secur..
[17] Yingyou Wen,et al. Passive Worm Propagation Modeling and Analysis , 2007, 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07).
[18] Feng Du. An Effective Pattern Matching Algorithm for Intrusion Detection , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[19] Alec Yasinsac,et al. Metadata for anomaly-based security protocol attack deduction , 2004, IEEE Transactions on Knowledge and Data Engineering.
[20] Zheng Bao-yu,et al. Mobility-Aware and Load Balancing Based Clustering Algorithm for Energy Conservation in MANET * , 2005 .
[21] Min-Shiang Hwang,et al. An efficient key assignment scheme for access control in a large leaf class hierarchy , 2011, Inf. Sci..
[22] Sheng-Shih Wang,et al. Securing Bluetooth Communications , 2012, Int. J. Netw. Secur..
[23] Yuan-Cheng Lai,et al. Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems , 2012, IEEE Communications Magazine.
[24] I. Kononenko,et al. INDUCTION OF DECISION TREES USING RELIEFF , 1995 .
[25] G. Mohankumar. Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks , 2010 .
[26] Chun-Ta Li,et al. Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments , 2008, Comput. Commun..
[27] Yen-Ping Chu,et al. An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks , 2009 .
[28] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[29] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[30] Thiagarajan Hamsapriya,et al. Statistical Segregation Method to Minimize the False Detections During DDoS Attacks , 2011, Int. J. Netw. Secur..
[31] Qin Zhiguang,et al. A Survey of E-Commerce Security , 2004 .
[32] Abhinav Srivastava,et al. Database Intrusion Detection using Weighted Sequence Mining , 2006, J. Comput..
[33] Cheng-Chi Lee,et al. A secure e-auction scheme based on group signatures , 2009, Inf. Syst. Frontiers.
[34] Min-Shiang Hwang,et al. An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks , 2010 .
[35] Zhou Ming-tian,et al. Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis , 2006 .
[36] Wen-Guey Tzeng,et al. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding , 2012, IEEE Transactions on Parallel and Distributed Systems.
[37] Dharma P. Agrawal,et al. Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[38] Bimal Kumar Mishra,et al. Differential Epidemic Model of Virus and Worms in Computer Network , 2012, Int. J. Netw. Secur..
[39] Wei-Pang Yang,et al. A communication-efficient three-party password authenticated key exchange protocol , 2011, Inf. Sci..
[40] Huang Houkuan,et al. An evolving intrusion detection system based on natural immune system , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..
[41] Cheng-Chi Lee,et al. Extension of authentication protocol for GSM , 2003 .
[42] Vinayak Ashok Bharadi,et al. Performance Comparison of DCT and VQ Based Techniques for Iris Recognition , 2010 .
[43] Min-Shiang Hwang,et al. DoS-resistant ID-based password authentication scheme using smart cards , 2010, J. Syst. Softw..
[44] Min-Shiang Hwang,et al. A Secure LITESET Scheme , 2004, IEICE Trans. Inf. Syst..
[45] Ali Moeini,et al. NFIDS: a neuro-fuzzy intrusion detection system , 2003, 10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003.
[46] Dinesh Kumar Saini,et al. SEIRS epidemic model with delay for transmission of malicious objects in computer network , 2007, Appl. Math. Comput..
[47] Guanling Chen,et al. Simulating non-scanning worms on peer-to-peer networks , 2006, InfoScale '06.
[48] B. B. Gupta,et al. ANN Based Scheme to Predict Number of Zombies in a DDoS Attack , 2012, Int. J. Netw. Secur..
[49] Fangwei Wang,et al. Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks , 2010, Int. J. Netw. Secur..
[50] Zhou Di,et al. Feature representation and selection in malicious code detection methods based on static system calls , 2011 .
[51] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[52] Yuan-Cheng Lai,et al. Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems , 2012, Int. J. Netw. Secur..
[53] Peng Liu,et al. Towards Database Firewalls , 2005, DBSec.
[54] Ming Yin,et al. A new study in encryption base on fractional order chaotic system , 2008, 2008 International Conference on Communications, Circuits and Systems.
[55] Nāgārjuna,et al. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding , 2014 .
[56] Yuh-Jye Lee,et al. Anomaly Detection via Online Oversampling Principal Component Analysis , 2013, IEEE Transactions on Knowledge and Data Engineering.