Journal of Information
Assurance and Security
Volume 4, Issue 3, June 2009
Special Issue on Intrusion and Malware Detection (Editorial)
Guest editors: Johnson Thomas, OSU, USA and Wei Yan, Trend Micro Inc., USA
|
Page no. |
A Genetic Algorithm-based Solution for Intrusion Detection |
192
|
Zorana Banković, Jos� M. Moya, �lvaro Araujo, Slobodan Bojanić and Octavio Nieto-Taladriz |
|
|
|
|
|
Queuing theory based models for studying intrusion evolution and elimination in computer networks |
200 |
P. Kammas, T. Komninos, Y.C. Stamatiou |
|
|
|
|
|
|
|
An Intrusion Detection System based on Hierarchical Self-Organization |
209 |
Esteban J. Palomo, Enrique Dom�nguez, Rafael M. Luque and Jos� Mu�oz |
|
|
|
|
|
Ensemble Classifiers for Network Intrusion Detection System |
217 |
Anazida Zainal, Mohd Aizaini Maarof and Siti Mariyam Shamsuddin |
|
|
|
Applying Intrusion Detection to Automotive IT � Early Insights and Remaining Challenges |
226 |
Tobias Hoppe, Stefan Kiltz and Jana Dittmann |
|
|
|
|
|
A System Architecture for Operator-Centric and Adaptive Intrusion Detection |
236 |
Ulf E. Larson, Stefan Lindskog, Dennis K. Nilsson, and Erland Jonsson |
|
|
|
Using Qualia and Hierarchical Models in Malware
Detection |
247 |
Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, and Steven K. Rogers |
|
|
|
ACMF: Framework for modeling attack based on Capability Model Navneet Kumar Pandey, S. K. Gupta and Shaveta Leekha |
256 |
| | |
|
|
|
Analysis of User Command Behavior and Masquerade Detection |
265 |
Shou-Hsuan Stephen Huang and Han-Ching Wu |
|
|
|
A Kernel Data Analysis Method for Detecting Flood Attacks (brief paper) |
274 |
Jaeik Cho, Manhyun Chung and Jongsub Moon |
|
|
|
A security policy and Network Cartography based Intrusion Detection and Prevention Systems |
279 |
Sourour Meharouech, Adel Bouhoula, Tarek Abbes
|
|
|
|
Detection of Email Worm-Infected Machines on the Local Name Servers Using Time Series Analysis |
292 |
Nikolaos Chatzis and Radu Popescu-Zeletin |
|
Copyright �
2005 - 2009, Dynamic Publishers Inc., USA
No part of Journal of Information Assurance and Security may be reproduced
or transmitted in any form or by any means without written permission from
the publisher. Journal of Information Assurance and Security has been
registered with the Copyright Clearance Center (CCC) Transactional
Reporting Services. Consent is given for coping of articles for personal
or internal use, or for the personal use of specific clients provided that
the base fee $05.00 (per copy, per article) is paid directly to CCC, 27
Congress St., Salem, MA 01970, USA. For those organizations that have been
granted a photo copy license by CCC, a separate system of payment has been
arranged. The fee code for users of the Transactional Reporting Service is
1060 5369/93 $03.50.
|