Intrusion detection: A survey

A Lazarevic, V Kumar, J Srivastava - Managing cyber threats: Issues …, 2005 - Springer
This chapter provides the overview of the state of the art in intrusion detection research.
Intrusion detection systems are software and/or hardware components that monitor …

Multiagent systems for network intrusion detection: A review

Á Herrero, E Corchado - … Intelligence in Security for Information Systems …, 2009 - Springer
Abstract More and more, Intrusion Detection Systems (IDSs) are seen as an important
component in comprehensive security solutions. Thus, IDSs are common elements in …

CIDS: An agent-based intrusion detection system

D Dasgupta, F Gonzalez, K Yallapu, J Gomez… - Computers & …, 2005 - Elsevier
The paper describes security agent architecture, called CIDS, which is useful as an
administrative tool for intrusion detection. Specifically, it is an agent-based monitoring and …

Analysis of the self-excited induction generator steady state performance using a new efficient algorithm

A Kheldoun, L Refoufi, DE Khodja - Electric Power Systems Research, 2012 - Elsevier
The paper presents the application of DIRECT algorithm to analyse the performance of the
Self-excited induction generator (SEIG). To the author best knowledge, this is the first …

IDReAM: Intrusion detection and response executed with agent mobility architecture and implementation

N Foukia - Proceedings of the fourth international joint conference …, 2005 - dl.acm.org
This paper deals with a new approach to build a completely distributed and decentralized
Intrusion Detection and Response System (IDRS) in computer networks. This approach is …

APHIDS: A mobile agent-based programmable hybrid intrusion detection system

K Deeter, K Singh, S Wilson, L Filipozzi… - … Aware Technologies and …, 2004 - Springer
Intrusion detection systems are quickly becoming a standard requirement in building a
network security infrastructure. Although many established techniques and commercial …

Preemptive distributed intrusion detection using mobile agents

PC Chan, VK Wei - Proceedings. Eleventh IEEE International …, 2002 - ieeexplore.ieee.org
Distributed intrusion detection systems have many advantages over their centralized
counterparts such as scalability, subversion resistance, and graceful service degradation …

Combining world wide web and wireless security

J Claessens, B Preneel, J Vandewalle - … Security: IFIP TC11 WG11. 4 First …, 2002 - Springer
In current electronic commerce systems, customers have an on-line interaction with
merchants via a browser on their personal computer. Also payment is done electronically via …

Sparta: A Mobile Agent based Intrusion Detection System

C Krügel, T Toth, E Kirda - Advances in Network and Distributed Systems …, 2002 - Springer
The large number of machines with different operating systems and applications in an
enterprise network makes it very difficult for the system administrator to close all security …

Agent-based model of computer network security system: A case study

VI Gorodetski, O Karsayev, A Khabalov… - Information Assurance in …, 2001 - Springer
The paper considers a multi-agent model of a computer networks security system, which is
composed of particular autonomous knowledge-based agents, distributed over the hosts of …