Bluetooth network-based misuse detection

T OConnor, D Reeves - 2008 Annual Computer Security …, 2008 - ieeexplore.ieee.org
Bluetooth, a protocol designed to replace peripheral cables, has grown steadily over the last
five years and includes a variety of applications. The Bluetooth protocol operates on a wide …

A component-based framework for visualization of intrusion detection events

A Luse, KP Scheibe, AM Townsend - Information Security Journal …, 2008 - Taylor & Francis
Visualization systems for intrusion detection are becoming more prevalent, but the lack of an
organizing framework for proper development of these systems is problematic. This paper …

[PDF][PDF] Bluetooth intrusion detection

T OConnor - 2008 - repository.lib.ncsu.edu
Bluetooth, a protocol designed to replace peripheral cables, has grown steadily over the last
five years and includes a variety of applications. In near ubiquity now, the Bluetooth protocol …

Visualising network security attacks with multiple 3D visualisation and false alert classification

S Musa - 2008 - repository.lboro.ac.uk
Increasing numbers of alerts produced by network intrusion detection systems (NIDS) have
burdened the job of security analysts especially in identifying and responding to them. The …