GoldPhish: Using Images for Content-Based Phishing Analysis
Dunlop, Matthew, Groat, Stephen, Shelly, David
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (2010)
Get full text
Conference Proceeding
Observations of UDP to TCP Ratio and Port Numbers
DongJin Lee, Carpenter, Brian E, Brownlee, Nevil
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
Coalitional Game Theory for Security Risk Management
Saad, Walid, Alpcan, Tansu, Basar, Tamer, Hjorungnes, Are
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
FEMRA: Fuzzy Expert Model for Risk Assessment
Sendi, Alireza Shameli, Jabbarifar, Masoume, Shajari, Mehdi, Dagenais, Michel
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
BotDigger: A Fuzzy Inference System for Botnet Detection
Al-Duwairi, Basheer, Al-Ebbini, Lina
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
Risk-Aware Usage Decision Making in Highly Dynamic Systems
Krautsevich, Leanid, Lazouski, Aliaksandr, Martinelli, Fabio, Yautsiukhin, Artsiom
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
Risk Management for Web and Distributed Software Development Projects
Keshlaf, Ayad Ali, Riddle, Steve
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
Preface
Published in 2010 Fifth International Conference on Internet Monitoring and Protection
(01.05.2010)
Get full text
Conference Proceeding
A-MAKE: An Efficient, Anonymous and Accountable Authentication Framework for WMNs
Durahim, Ahmet Onur, Savaş, Erkay
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
IDSAI: A Distributed System for Intrusion Detection Based on Intelligent Agents
Sanz-Bobi, Miguel A, Castro, Mario, Santos, Javier
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
A Novel Method for Supporting Fairness in Digital License Reselling
Gaber, Tarek, Ning Zhang
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
Is Apple's iMac Leopard Operating System Secure under ARP-Based Flooding Attacks?
Surisetty, Sirisha, Kumar, Sanjeev
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
Decision Tree Based on Shannon, Rényi and Tsallis Entropies for Intrusion Tolerant Systems
Lima, Christiane Ferreira Lemos, de Assis, Francisco Marcos, de Souza, Cleonilson Protasio
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
Sound-Based Multimodal Person Identification from Signature and Voice
Li, Francis F
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
A Proposal of a Communication-Broadcasting Integrated System to Support Communication and Navigation during Disasters
Hiehata, Yasuhiko, Koto, Hideyuki, Nakamura, Hajime
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
Implicit Malpractice and Suspicious Traffic Detection in Large Scale IP Networks
Seppälä, Timo, Alapaholuoma, Teemu, Knuuti, Olli, Ylinen, Jorma, Loula, Pekka, Hätönen, Kimmo
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
Comparing Anomaly Detection Methods in Computer Networks
Löf, Andreas, Nelson, Richard
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
IDS Adaptation for an Efficient Detection in High-Speed Networks
Zaidi, Abdelhalim, Kenaza, Tayeb, Agoulmine, Nazim
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
Implementing Privacy with Erlang Active Objects
Fleck, Andreas, Kammüller, Florian
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding
Constructing Communication Profiles by Clustering Selected Network Traffic Attributes
Knuuti, Olli, Seppälä, Timo, Alapaholuoma, Teemu, Ylinen, Jorma, Loula, Pekka, Kumpulainen, Pekka, Hätönen, Kimmo
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Published in 2010 Fifth International Conference on Internet Monitoring and Protection (01.05.2010)
Get full text
Conference Proceeding