[PDF][PDF] Intrusion detection systems: A survey and taxonomy
S Axelsson - 2000 - Citeseer
This paper presents a taxonomy of intrusion detection systems that is then used to survey
and classify a number of research prototypes. The taxonomy consists of a classification first …
and classify a number of research prototypes. The taxonomy consists of a classification first …
Challenges in intrusion detection for wireless ad-hoc networks
P Brutch, C Ko - 2003 Symposium on Applications and the …, 2003 - ieeexplore.ieee.org
This paper presents a brief survey of current research in intrusion detection for wireless ad-
hoc networks. In addition to examining the challenges of providing intrusion detection in this …
hoc networks. In addition to examining the challenges of providing intrusion detection in this …
[PDF][PDF] Research in intrusion-detection systems: A survey
S Axelsson - 1998 - engineering.iastate.edu
There is currently need for an up-to-date and thorough survey of the research in the field of
computer and network intrusion detection. This paper presents such a survey, with a …
computer and network intrusion detection. This paper presents such a survey, with a …
The OPTLS protocol and TLS 1.3
H Krawczyk, H Wee - 2016 IEEE European Symposium on …, 2016 - ieeexplore.ieee.org
We present the OPTLS key-exchange protocol, its design, rationale and cryptographic
analysis. OPTLS design has been motivated by the ongoing work in the TLS working group …
analysis. OPTLS design has been motivated by the ongoing work in the TLS working group …
Collaborating against common enemies
This paper presents the first wide-scale study of correlated attacks, ie, attacks mounted by
the same source IP against different networks. Using a large dataset from $1700 $ intrusion …
the same source IP against different networks. Using a large dataset from $1700 $ intrusion …
[PDF][PDF] A survey of cyber attack detection systems
S Singh, S Silakari - International Journal of Computer Science and …, 2009 - academia.edu
In the recent years, number of attacks on networks has exponentially increased therefore;
interest in cyber attack detection has increased among the researchers. The tremendous …
interest in cyber attack detection has increased among the researchers. The tremendous …
Tracing based active intrusion response
Network-based intrusion has become a serious threat to today's highly networked
information systems, existing intrusion defense approaches such as intrusion prevention …
information systems, existing intrusion defense approaches such as intrusion prevention …
Smart devices threats, vulnerabilities and malware detection approaches: a survey
D BalaGanesh, A Chakrabarti… - European Journal of …, 2018 - ej-eng.org
In recent times, malware detection mechanism systems of mobile smart devices are getting
growing concentration from researchers. With the quick expansion of malwares found in …
growing concentration from researchers. With the quick expansion of malwares found in …
Content-based methodology for anomaly detection on the web
As became apparent after the tragic events of September 11, 2001, terrorist organizations
and other criminal groups are increasingly using the legitimate ways of Internet access to …
and other criminal groups are increasingly using the legitimate ways of Internet access to …
Integration of self-organizing map (SOM) and kernel density estimation (KDE) for network intrusion detection
This paper proposes an approach to integrate the self-organizing map (SOM) and kernel
density estimation (KDE) techniques for the anomaly-based network intrusion detection …
density estimation (KDE) techniques for the anomaly-based network intrusion detection …