, , 2008.
Intrusion Detection : Network Security beyond the firewall, 1998. ,
Secure multi-party computation -working draft, 2000. ,
FAQ : Network intryusion detection system, 2001. ,
The architecture of a network level intrusion detection system, 1990. ,
Introduction to Automata Theory, Languages and Computability, 2000. ,
Indra : a peer-to-peer approach to network intrusion detection and prevention, Proc. of the 12th IEEE International Workshops on Enabling Technologies : Infrastructure for Collaborative Enterprises, pp.226-231, 2003. ,
An architecture for privacy-preserving mining of client information, Proc. of the Workshop on Privacy, Security, and Data Mining in conjunction with the 2002 IEEE ICDM Conf, pp.27-42, 2002. ,
Towards collaborative security and p2p intrusion detection, Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, 2005. ,
Defending yourself : the role of intrusion detection systems, IEEE Software, pp.42-51, 2000. ,
Practical Intrusion Detection Handbook, 2001. ,
Anomalous payload-based worm detection and signature generation, Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection, 2005. ,
Journal of Research and Practice in Information Technology, vol.38, 2006. ,
Evaluation of a decentralized architecture for large scale collaborative intrusion detection, Proceedings of the 10th IFIP/IEEE International Symposium on Integrated Network Management (IM 2007), pp.80-89, 2007. ,