Taxonomy and survey of collaborative intrusion detection

E Vasilomanolakis, S Karuppayah… - ACM computing …, 2015 - dl.acm.org
The dependency of our society on networked computers has become frightening: In the
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …

[图书][B] Cybercrime in progress: Theory and prevention of technology-enabled offenses

T Holt, A Bossler - 2015 - taylorfrancis.com
The emergence of the World Wide Web, smartphones, and computers has transformed the
world and enabled individuals to engage in crimes in a multitude of new ways …

Evaluating computer intrusion detection systems: A survey of common practices

A Milenkoski, M Vieira, S Kounev, A Avritzer… - ACM Computing …, 2015 - dl.acm.org
The evaluation of computer intrusion detection systems (which we refer to as intrusion
detection systems) is an active research area. In this article, we survey and systematize …

On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems

S Elhag, A Fernández, A Bawakid, S Alshomrani… - Expert Systems with …, 2015 - Elsevier
Security policies of information systems and networks are designed for maintaining the
integrity of both the confidentiality and availability of the data for their trusted users …

Sequence-aware intrusion detection in industrial control systems

M Caselli, E Zambon, F Kargl - Proceedings of the 1st ACM Workshop …, 2015 - dl.acm.org
Nowadays, several threats endanger cyber-physical systems. Among these systems,
industrial control systems (ICS) operating on critical infrastructures have been proven to be …

Security threats in cloud computing

P Deshpande, SC Sharma… - … conference on computing …, 2015 - ieeexplore.ieee.org
This paper reports a detailed analysis and categorization of various security threats in a
cloud computing environment along with a brief taxonomy of intrusion detection system. The …

Comparative study and analysis of network intrusion detection tools

DA Bhosale, VM Mane - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Security has a significant influence in network management. One of the most common way
to secure information in the computer from malicious use is IDS Intrusion detection system …

Anomaly intrusions detection based on support vector machines with an improved bat algorithm

AC Enache, V Sgârciu - 2015 20th international conference on …, 2015 - ieeexplore.ieee.org
The continuous proliferation of more complex and various security threats leads to the
conclusion that new solutions are required. Intrusion Detection Systems can be a pertinent …

A consensus based network intrusion detection system

M Toulouse, BQ Minh, P Curtis - 2015 5th International …, 2015 - ieeexplore.ieee.org
Network intrusion detection is the process of identifying malicious behaviors that target a
network and its resources. Current systems implementing intrusion detection processes …

Real-time signature-based detection approach for SMS botnet

AJ Alzahrani, AA Ghorbani - 2015 13th Annual Conference on …, 2015 - ieeexplore.ieee.org
As an open platform for mobile electronic devices, Android is experiencing a steady growth
in the number of published applications (apps). Features of the Android platform have …