Author of the publication

Robust and scalable trust management for collaborative intrusion detection.

, , , and . Integrated Network Management, page 33-40. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Leveraging Policy-Based Management for Maximizing Business Profit., and . IEEE Trans. Network and Service Management, 4 (3): 25-39 (2007)CyberPlanner: A comprehensive toolkit for network service providers., , and . NOMS, page 379-386. IEEE, (2008)GXLA a Language for the Specification of Service Level Agreements., and . Autonomic Networking, volume 4195 of Lecture Notes in Computer Science, page 201-214. Springer, (2006)FireCol: a collaborative protection network for the detection of flooding DDoS attacks., , and . IEEE/ACM Trans. Netw., 20 (6): 1828-1841 (2012)Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention., , , and . ICC, page 1-6. IEEE, (2009)Business-Driven Optimization of Policy-Based Management solutions., and . Integrated Network Management, page 254-263. IEEE, (2007)Characterization and Solution to a Stateful IDS Evasion., , and . ICDCS, page 597-604. IEEE Computer Society, (2009)FuzMet: a fuzzy-logic based alert prioritization engine for intrusion detection systems., , and . Int. Journal of Network Management, 22 (4): 263-284 (2012)Analysis of Policy Management Models and Specification Languages., , , and . Net-Con, volume 261 of IFIP Conference Proceedings, page 26-50. Kluwer, (2003)Robust and scalable trust management for collaborative intrusion detection., , , and . Integrated Network Management, page 33-40. IEEE, (2009)