Search Results - "Dedinski, I."

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    A Novelty-Driven Approach to Intrusion Alert Correlation Based on Distributed Hash Tables by Hofmann, A., Dedinski, I., Sick, B., de Meer, H.

    “…Distributed intrusion detection and prevention plays an increasingly important role in securing computer networks. In a distributed intrusion detection system,…”
    Get full text
    Conference Proceeding
  2. 2

    A Source Routing Solution to Non-Transitive Connectivity Problems in Distributed Hash Tables by Dedinski, I., Berl, A., Hofmann, A., Heglmeier, S., Sick, B., de Meer, H.

    “…Distributed hash tables are popular third generation P2P protocols which are well understood in theory. These protocols usually assume that every node in the…”
    Get full text
    Conference Proceeding
  3. 3

    Cooperative Keep-Alives: An Efficient Outage Detection Algorithm for P2P Overlay Networks by Dedinski, I., Hofmann, A., Sick, B.

    “…One of the challenges of today's overlay networks, especially P2P, is still scalability. A key issue in almost all of the current overlay architectures is the…”
    Get full text
    Conference Proceeding
  4. 4

    A framework for large-scale simulation of collaborative intrusion detection systems by Fisch, D., Hofmann, A., Hornik, V., Dedinski, I., Sick, B.

    “…Distributed intrusion detection and prevention play an increasingly important role in securing computer networks. In a distributed intrusion detection system,…”
    Get full text
    Conference Proceeding