Agent-Based Approach for Distributed Intrusion Detection System Design
暂无分享,去创建一个
Ngoc Thanh Nguyen | Grzegorz Kolaczek | Krzysztof Juszczyszyn | Adam Grzech | Radoslaw Katarzyniak | Agnieszka Pieczynska | N. Nguyen | G. Kolaczek | A. Grzech | R. Katarzyniak | K. Juszczyszyn | Agnieszka Pieczynska
[1] Jason Lee,et al. A first look at modern enterprise traffic , 2005, IMC '05.
[2] S. Bornholdt,et al. Scale-free topology of e-mail networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[3] Eddie Kohler,et al. Observed structure of addresses in IP traffic , 2006, TNET.
[4] Ngoc Thanh Nguyen,et al. A Mobile Agent Approach to Intrusion Detection in Network Systems , 2005, KES.
[5] Ilkka Norros,et al. A storage model with self-similar input , 1994, Queueing Syst. Theory Appl..
[6] Ngoc Thanh Nguyen,et al. Consensus system for solving conflicts in distributed systems , 2002, Inf. Sci..
[7] Lakhmi C. Jain,et al. Knowledge-Based Intelligent Information and Engineering Systems , 2004, Lecture Notes in Computer Science.
[8] Christophe Diot,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM.
[9] Michalis Faloutsos,et al. On power-law relationships of the Internet topology , 1999, SIGCOMM '99.
[10] David M. Nicol,et al. Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure , 2003, Computer Performance Evaluation / TOOLS.
[11] P. Oscar Boykin,et al. Personal Email Networks: An Effective Anti-Spam Tool , 2004, ArXiv.
[12] P. Oscar Boykin,et al. Leveraging social networks to fight spam , 2005, Computer.