No abstract available.
Cited By
- Ulltveit-Moe N and Oleshchuk V (2015). A novel policy-driven reversible anonymisation scheme for XML-based services, Information Systems, 48:C, (164-178), Online publication date: 1-Mar-2015.
- Ulltveit-Moe N, Oleshchuk V and Køien G (2011). Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context, Wireless Personal Communications: An International Journal, 57:3, (317-338), Online publication date: 1-Apr-2011.
- Apel M, Biskup J, Flegel U and Meier M Towards early warning systems Proceedings of the 4th international conference on Critical information infrastructures security, (151-164)
Index Terms
- Privacy-Respecting Intrusion Detection (Advances in Information Security)
Recommendations
A Survey on Intrusion Detection and Prevention Systems
AbstractIn the digital world, malicious activities that violate the confidentiality, integrity, or availability of data and devices are known as intrusions. An intrusion detection system (IDS) analyses the activities of a single system or a network to ...
Network intrusion detection
Intrusion detection is a new, retrofit approach for providing a sense of security in existing computers and data networks, while allowing them to operate in their current "open" mode. The goal of intrusion detection is to identify unauthorized use, ...
Enhancing Intrusion Detection System with proximity information
Intrusion Detection Systems (IDSes) proposed to identify or prevent the wide spread of worms can be largely classified as signature-based or anomaly-based. Modern worms are often sufficiently intelligent to hide their activities and evade anomaly ...