[PDF][PDF] Intrusion detection systems: A survey and taxonomy

S Axelsson - 2000 - Citeseer
This paper presents a taxonomy of intrusion detection systems that is then used to survey
and classify a number of research prototypes. The taxonomy consists of a classification first …

Challenges in intrusion detection for wireless ad-hoc networks

P Brutch, C Ko - 2003 Symposium on Applications and the …, 2003 - ieeexplore.ieee.org
This paper presents a brief survey of current research in intrusion detection for wireless ad-
hoc networks. In addition to examining the challenges of providing intrusion detection in this …

[PDF][PDF] Research in intrusion-detection systems: A survey

S Axelsson - 1998 - engineering.iastate.edu
There is currently need for an up-to-date and thorough survey of the research in the field of
computer and network intrusion detection. This paper presents such a survey, with a …

The OPTLS protocol and TLS 1.3

H Krawczyk, H Wee - 2016 IEEE European Symposium on …, 2016 - ieeexplore.ieee.org
We present the OPTLS key-exchange protocol, its design, rationale and cryptographic
analysis. OPTLS design has been motivated by the ongoing work in the TLS working group …

Collaborating against common enemies

S Katti, B Krishnamurthy, D Katabi - Proceedings of the 5th ACM …, 2005 - usenix.org
This paper presents the first wide-scale study of correlated attacks, ie, attacks mounted by
the same source IP against different networks. Using a large dataset from $1700 $ intrusion …

[PDF][PDF] A survey of cyber attack detection systems

S Singh, S Silakari - International Journal of Computer Science and …, 2009 - academia.edu
In the recent years, number of attacks on networks has exponentially increased therefore;
interest in cyber attack detection has increased among the researchers. The tremendous …

Tracing based active intrusion response

X Wang, DS Reeves, SF Wu - Journal of Information Warfare, 2001 - JSTOR
Network-based intrusion has become a serious threat to today's highly networked
information systems, existing intrusion defense approaches such as intrusion prevention …

Smart devices threats, vulnerabilities and malware detection approaches: a survey

D BalaGanesh, A Chakrabarti… - European Journal of …, 2018 - ej-eng.org
In recent times, malware detection mechanism systems of mobile smart devices are getting
growing concentration from researchers. With the quick expansion of malwares found in …

Content-based methodology for anomaly detection on the web

M Last, B Shapira, Y Elovici, O Zaafrany… - Advances in Web …, 2003 - Springer
As became apparent after the tragic events of September 11, 2001, terrorist organizations
and other criminal groups are increasingly using the legitimate ways of Internet access to …

Integration of self-organizing map (SOM) and kernel density estimation (KDE) for network intrusion detection

Y Cao, H He, H Man, X Shen - … /Unattended Sensors and …, 2009 - spiedigitallibrary.org
This paper proposes an approach to integrate the self-organizing map (SOM) and kernel
density estimation (KDE) techniques for the anomaly-based network intrusion detection …