Alert correlation in a cooperative intrusion detection framework, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.118-123, 2005. ,
DOI : 10.1109/SECPRI.2002.1004372
Intrusion Detection: Network Security beyond the firewall, 1998. ,
Secure multi-party computation, 2000. ,
The architecture of a network level intrusion detection system, 1990. ,
DOI : 10.2172/425295
Indra: a peer-to-peer approach to network intrusion detection and prevention, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003., 2003. ,
DOI : 10.1109/ENABL.2003.1231412
An architecture for privacy-preserving mining of client information, Proc. of the Workshop on Privacy, pp.27-42, 2002. ,
Towards collaborative security and P2P intrusion detection, Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005., 2005. ,
DOI : 10.1109/IAW.2005.1495971
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.9746
Defending Yourself: The Role of Intrusion Detection Systems, IEEE Software, vol.17, issue.5, pp.42-51, 2000. ,
DOI : 10.1109/52.877859
Practical Intrusion Detection Handbook, 2001. ,
Anomalous Payload-Based Worm Detection and Signature Generation, Proc. of the 8th International Symposium on Recent Advances in Intrusion Detection, 2005. ,
DOI : 10.1007/11663812_12
Cooperative defence against ddos attacks, Journal of Research and Practice in Information Technology, vol.38, issue.1, 2006. ,
Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, 2007. ,
DOI : 10.1109/INM.2007.374772