| 000 | 03628cam a2200361 i 4500 | ||
|---|---|---|---|
| 999 |
_c9096 _d9096 |
||
| 001 | 793224635 | ||
| 005 | 20210427114547.0 | ||
| 008 | 130927s2014 flua b 001 0 eng | ||
| 010 | _a2013039508 | ||
| 020 | _a9781466564121 (hardcover : alk. paper) | ||
| 020 | _a1466564121 (hardcover : alk. paper) | ||
| 040 |
_aDLC _beng _erda _cDLC _dYDX _dBTCTA _dYDXCP _dOCLCF _dUtOrBLW |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bF85 2014 |
| 082 | 0 | 0 |
_a005.8 _223 _bF.C.I |
| 100 | 1 |
_aFung, Carol, _eauthor. |
|
| 245 | 1 | 0 |
_aIntrusion detection networks : _ba key to collaborative security / _cCarol Fung and Raouf Boutaba. |
| 264 | 1 |
_aBoca Raton : _bCRC Press, _c[2014] |
|
| 300 |
_axxii, 239 pages ; _c24 cm. |
||
| 336 |
_atext _2rdacontent. |
||
| 337 |
_aunmediated _2rdamedia. |
||
| 338 |
_avolume _2rdacarrier. |
||
| 500 | _acomputer bookfair2015 | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aFront Cover Contents (1/2) Contents (2/2) List of Figures List of Tables Preface About the Authors SECTION I: INTRODUCTION (1/2) SECTION I: INTRODUCTION (2/2) SECTION II: CYBER INTRUSIONS AND INTRUSION DETECTION 2. Cyber Intrusions (1/3) 2. Cyber Intrusions (2/3) 2. Cyber Intrusions (3/3) 3. Intrusion Detection (1/4) 3. Intrusion Detection (2/4) 3. Intrusion Detection (3/4) 3. Intrusion Detection (4/4) SECTION III: DESIGN OF AN INTRUSION DETECTION NETWORK 4. Collaborative Intrusion Detection Networks Architecture Design (1/2) 4. Collaborative Intrusion Detection Networks Architecture Design (2/2) 5. Trust Management (1/5) 5. Trust Management (2/5) 5. Trust Management (3/5) 5. Trust Management (4/5) 5. Trust Management (5/5) 6. Collaborative Decision (1/5) 6. Collaborative Decision (2/5) 6. Collaborative Decision (3/5) 6. Collaborative Decision (4/5) 6. Collaborative Decision (5/5) 7. Resource Management (1/5) 7. Resource Management (2/5) 7. Resource Management (3/5) 7. Resource Management (4/5) 7. Resource Management (5/5) 8. Collaborators Selection and Management (1/6) 8. Collaborators Selection and Management (2/6) 8. Collaborators Selection and Management (3/6) 8. Collaborators Selection and Management (4/6) 8. Collaborators Selection and Management (5/6) 8. Collaborators Selection and Management (6/6) SECTION IV: OTHER TYPES OF IDN DESIGN 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (1/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (2/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (3/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (4/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (5/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (6/7) 9. Knowledge-Based Intrusion Detection Networks and Knowledge Propagation (7/7) 10. Collaborative Malware Detection Networks (1/6) 10. Collaborative Malware Detection Networks (2/6) 10. Collaborative Malware Detection Networks (3/6) 10. Collaborative Malware Detection Networks (4/6) 10. Collaborative Malware Detection Networks (5/6) 10. Collaborative Malware Detection Networks (6/6) SECTION V: CONCLUSION SECTION VI: APPENDICES A. Examples of Intrusion Detection Rules and Alerts B. Proofs of Theorems | |
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aComputers _xAccess control. |
|
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 700 | 1 |
_aBoutaba, Raouf, _eauthor. |
|
| 856 | 4 | 1 |
_3Abstract _uhttp://repository.fue.edu.eg/xmlui/handle/123456789/3611 |
| 942 |
_2ddc _cBK |
||