Search Results - "Dedinski, I."
-
1
A Novelty-Driven Approach to Intrusion Alert Correlation Based on Distributed Hash Tables
Published in 2007 12th IEEE Symposium on Computers and Communications (01-07-2007)“…Distributed intrusion detection and prevention plays an increasingly important role in securing computer networks. In a distributed intrusion detection system,…”
Get full text
Conference Proceeding -
2
A Source Routing Solution to Non-Transitive Connectivity Problems in Distributed Hash Tables
Published in 2007 12th IEEE Symposium on Computers and Communications (01-07-2007)“…Distributed hash tables are popular third generation P2P protocols which are well understood in theory. These protocols usually assume that every node in the…”
Get full text
Conference Proceeding -
3
Cooperative Keep-Alives: An Efficient Outage Detection Algorithm for P2P Overlay Networks
Published in Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007) (01-09-2007)“…One of the challenges of today's overlay networks, especially P2P, is still scalability. A key issue in almost all of the current overlay architectures is the…”
Get full text
Conference Proceeding -
4
A framework for large-scale simulation of collaborative intrusion detection systems
Published in 2008 IEEE Conference on Soft Computing in Industrial Applications (01-06-2008)“…Distributed intrusion detection and prevention play an increasingly important role in securing computer networks. In a distributed intrusion detection system,…”
Get full text
Conference Proceeding