J. Joaquim, k. bakhtiyari and m. J. o. N. a. C. A. a. taghavi, "Journal of Network and Computer Application authors Mona Taghavi, Kaveh Bakhtiyari ,Joaquim Junior".
|
W. M. E. و M. H. J., “"Principles of information security," ed: Course Technology Ptr, 2011, p. 315”.
|
|
K. Scarfone و P. Mell, “K. Scarfone and P. Mell, "Guide to intrusion detection and prevention systems (idps)," NIST Special Publication, vol. 800, p. 94, 2007.”.
|
|
G. Thatte, U. Mitra و J. Heidemann, “G. Thatte, U. Mitra, and J. Heidemann, "Parametric methods for anomaly detection in aggregate traffic,"IEEE/ACM Transactions on Networking (TON), vol. 19, pp. 512-525, 2011.”.
|
|
X. D. Hoang, J. Hu و P. Bertok,, “"A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference," Journal of Network and Computer Applications, vol. 32, pp. 1219-”.
|
|
H. T. Elshoush و I. M. Osman, “"Alert correlation in collaborative intelligent intrusion detection systems A survey," Applied Soft Computing, vol. 11, pp. 4349-4365, 2011.”.
|
|
J. M. Estevez-Tapiador, P. Garcia-Teodoro و E. Diaz-Verdejo, “"Anomaly detection methods in wired networks: a survey and taxonomy," Computer Communications, vol. 27, pp. 1569-1584, 2004”.
|
|
H. T. Elshoush و I. M. Osman, “"Alert correlation in collaborative intelligent intrusion detection systems A survey," Applied Soft Computing, vol. 11, pp. 4349-4365, 2011.”.
|
|
M. Leitner, P. Leitner, M. Zach و C. Fahy, “"Fault management based on peer-to-peer paradigms; a case study report from the celtic project madeira," in 10th IFIP/IEEE International Symposium”.
|
|
C. V. Zhou, C. Leckie و S. Karunasekera, “"A survey of coordinated attacks and collaborative intrusion detection," Computers & Security, vol. 29, pp. 124-140, 2010.”.
|
|
A. Patcha و J.-M. Park, “"An overview of anomaly detection techniques: Existing solutions and latest technological trends," Computer Networks, vol. 51, pp. 3448-3470, 2007”.
|
|
R. Perdisci, G. Giacinto و F. Roli, “"Alarm clustering for intrusion detection systems in computer networks," Engineering Applications of Artificial Intelligence, vol. 19, pp. 429-438, 2006”.
|
|
J. E. Gaffney Jr و J. W. Ulvila, “"Evaluation of intrusion detectors: A decision theory approach," in IEEE Symposium on Security and Privacy, 2001. S&P 2001, Oakland, CA , USA. pp.50-61, 2001, pp. 50-61”.
|
|
A. P. Moore, D. M. Cappelli و R. F. Trzeciak, “"The “Big Picture” of Insider IT Sabotage Across U.S Critical Infrastructures," in Insider Attack and Cyber Security. vol. 39, S. J. Stolfo, S. M. Bellovin, A. D.”.
|
|
P. García-Teodoro, J. Díaz-Verdejo, G. Maciá-Fernández و E. Vázquez, “"Anomaly-based network intrusion detection: Techniques, systems and challenges," Computers & Security, vol. 28, pp. 18-28,”.
|
|
M. Xie, B. Tian و S. Parvin, “"Anomaly detection in wireless sensor networks: A survey," Journal of Network and Computer Applications, vol. 34, pp. 1302-1325, 2011”.
|
|
S. Khanum, M. Usman و A. Alwabel, “"Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks," International Journal of Computer Science Issues, IJCSI, vol. 9, 2012.”.
|
|
O. Chung-Ming, “O. Chung-Ming, "Host-based intrusion detection systems adapted from agent-based artificial immune systems," Neurocomputing, 2012”.
|
|
A. Jaiswal و S. Jain, “"Database Intrusion Prevention Cum Detection System with Appropriate Response," International Journal of Information Technology, vol. 2, pp. 651-656, 2010.”.
|
|
K. Vieira, A. Schulter و C. Westphall, “"Intrusion Detection for Grid and Cloud Computing," IT Professional, vol. 12, pp. 38-43, 2010”.
|
|
Y. Li, C. Jing و J. Xu, “"A New Distributed Intrusion Detection Method Based on Immune Mobile Agent Life System Modeling and Intelligent Computing." vol. 6328, K. Li, M. Fei, L. Jia, and G. Irwin, Eds., ed: Springer Berlin / Heidelberg, 2010, pp. 233-243”.
|
|
O. Awodele, S. Idowu, O. Anjorin و V. J. Joshua, “"A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS)," Issues in Informing Science and Information Technology, vol. 6, 2009”.
|
|
M.-L. Shyu و V. Sainani, “"A Multiagent-based Intrusion Detection System with the Support of Multi-Class Supervised Classification," in Data Mining and Multi-agent Integration, L. Cao, Ed., ed: Springer US, 2009, pp. 127-142.”.
|
|
A. Rasoulifard, A. Ghaemi Bafghi و M. Kahani, “"Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers," in Advances in Computer Science and Engineering. vol. 6, H. Sarbazi-Azad, B. Parhami, S.-G. Miremadi, and S. Hessabi, Eds., ed: Springer Berlin Heidelberg, 2009, pp. 577-584”.
|
|
M.-Y. Su, G.-J. Yu و C.-Y. Lin, “"A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach," Computers & Security, vol. 28, pp. 301-309, 2009.”.
|
|
Á. Herrero و E. Corchado, “"Mining Network Traffic Data for Attacks through MOVICAB-IDS Foundations of Computational Intelligence Volume 4." vol. 204, A. Abraham, A.-E. Hassanien, and A. de Carvalho, Eds., ed: Springer Berlin / Heidelberg, 2009, pp. 377-394”.
|
|
A. Byrski و M. Carvalho, “"Agent-Based Immunological Intrusion Detection System for Mobile Ad-Hoc Networks Computational Science – ICCS 2008." vol. 5103, M. Bubak, G. van Albada, J. Dongarra, and P. Sloot, Eds., ed: Springer Berlin / Heidelberg, 2008, pp. 584-593.”.
|