Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky