Author of the publication

Detecting Anomalies in Active Insider Stepping Stone Attacks.

, , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (1): 103-120 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A General Cooperative Intrusion Detection Architecture for MANETs., , , , , , , , , and 1 other author(s). IWIA, page 57-70. IEEE Computer Society, (2005)InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic., , , and . ICDCS Workshops, page 99-106. IEEE Computer Society, (2005)LiPaD: lightweight packet drop detection for ad hoc networks., and . VTC Fall (2), page 1233-1237. IEEE, (2004)Detecting Anomalies in Active Insider Stepping Stone Attacks., , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (1): 103-120 (2011)Towards a Theory of Intrusion Detection., , and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 267-286. Springer, (2005)A Simple Admission Control Algorithm for IP Networks., , , , and . ICN (1), volume 2093 of Lecture Notes in Computer Science, page 117-123. Springer, (2001)Multicast Server Architectures for MARS-based ATM multicasting., and . RFC, (May 1997)AMRoute: Ad Hoc Multicast Routing Protocol., , , and . Mob. Networks Appl., 7 (6): 429-439 (2002)Single Connection Emulation (SCE): An Architecture for Providing a Reliable Multicast Transport Service., and . ICDCS, page 144-151. IEEE Computer Society, (1995)NOMAD: Traffic-based Network Monitoring Framework for Anomaly Detection., , and . ISCC, page 442-452. IEEE Computer Society, (1999)