2008 conference paper

Countering persistent kernel rootkits through systematic hook discovery

Recent advances in intrusion detection, raid 2008, 5230, 21–38.

By: Z. Wang, X. Jiang, W. Cui & X. Wang

Source: NC State University Libraries
Added: August 6, 2018

2002 journal article

Design and implementation of a decentralized prototype system for detecting distributed attacks

COMPUTER COMMUNICATIONS, 25(15), 1374–1391.

By: P. Ning*, S. Jajodia & X. Wang

author keywords: decentralized intrusion detection; misuse detection; computer security; network security
TL;DR: This paper presents the design and implementation of a decentralized research prototype intrusion detection system named coordinated attacks response and detection system (CARDS), which aims at detecting distributed attacks that cannot be detected using data collected at any single place. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2002 conference paper

Inter-packet delay based correlation for tracing encrypted connections through stepping stones

In G. K. D. Gollmann & M. Waidner (Eds.), Computer security--ESORICS 2002: 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002: proceedings (Lecture notes in computer science ; 2502) (Vol. 2502, pp. 244–263). New York: Springer.

By: X. Wang, D. Reeves & S. Wu

Ed(s): G. D. Gollmann & M. Waidner

Source: NC State University Libraries
Added: August 6, 2018

chapter

DecIdUouS: decentralized source identification for network-based intrusions

Chang, H. Y., Narayan, R., Saryor, C., Jou, P., Wu, S. F., Vetter, B. M., … Yuill, J. J. In S. M. M. Sloman & E. Lupu (Eds.), Integrated network management VI: Distributed management for the networked millennium (pp. 701–714). Piscataway, NJ: IEEE Pub.

By: H. Chang, R. Narayan, C. Saryor, P. Jou, S. Wu, B. Vetter, F. Gong, X. Wang, M. Brown, J. Yuill

Ed(s): S. M. Sloman & E. Lupu

Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.