Author of the publication

Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery.

, , and . ISC, volume 3225 of Lecture Notes in Computer Science, page 146-157. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PWC: a proactive worm containment solution for enterprise networks., , , , , and . Secur. Commun. Networks, 3 (4): 334-354 (2010)Real-time data attack isolation for commercial database applications., , and . J. Netw. Comput. Appl., 29 (4): 294-320 (2006)The Design and Implementation of a Self-Healing Database System., , , , , and . J. Intell. Inf. Syst., 23 (3): 247-269 (2004)Worm virulence estimation for the containment of local worm outbreak., , , and . Comput. Secur., 29 (1): 104-123 (2010)Visual toolkit for network security experiment specification and data analysis., , and . VizSEC, page 7-14. ACM, (2006)Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies., , and . Int. J. Inf. Comput. Secur., 1 (3): 315-340 (2007)Threshold Smart Walk for the Containment of Local Worm Outbreak., , and . GLOBECOM, page 2124-2128. IEEE, (2008)Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery., , and . ISC, volume 3225 of Lecture Notes in Computer Science, page 146-157. Springer, (2004)Evaluation of Collaborative Worm Containments on DETER Testbed., , , and . DETER, USENIX Association, (2007)PWC: A proactive worm containment solution for enterprise networks., , , , , and . SecureComm, page 433-442. IEEE, (2007)