F. Cuppens and A. Miege, Alert correlation in a cooperative intrusion detection framework, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.118-123, 2005.
DOI : 10.1109/SECPRI.2002.1004372

T. Escamilla, Intrusion Detection: Network Security beyond the firewall, 1998.

O. Goldreich, Secure multi-party computation, 2000.

R. Heady, G. Luger, A. Maccabe, and M. Servilla, The architecture of a network level intrusion detection system, 1990.
DOI : 10.2172/425295

R. Janakiraman, M. Waldvoge, and Q. Zhang, Indra: a peer-to-peer approach to network intrusion detection and prevention, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003., 2003.
DOI : 10.1109/ENABL.2003.1231412

M. Kantarcioglu and J. Vaidya, An architecture for privacy-preserving mining of client information, Proc. of the Workshop on Privacy, pp.27-42, 2002.

M. Locasto, J. Parekh, A. Keromytis, and S. Stolfo, Towards collaborative security and P2P intrusion detection, Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005., 2005.
DOI : 10.1109/IAW.2005.1495971

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.9746

J. Mchugh, A. Christie, and J. Allen, Defending Yourself: The Role of Intrusion Detection Systems, IEEE Software, vol.17, issue.5, pp.42-51, 2000.
DOI : 10.1109/52.877859

P. Proctor, Practical Intrusion Detection Handbook, 2001.

K. Wang, G. Cretu, and S. Stolfo, Anomalous Payload-Based Worm Detection and Signature Generation, Proc. of the 8th International Symposium on Recent Advances in Intrusion Detection, 2005.
DOI : 10.1007/11663812_12

G. Zhang and M. Parashar, Cooperative defence against ddos attacks, Journal of Research and Practice in Information Technology, vol.38, issue.1, 2006.

C. V. Zhou, S. Karunasekera, and C. Leckie, Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, 2007.
DOI : 10.1109/INM.2007.374772