|
|
|
|
LEADER |
03500nam a2200541 a 4500 |
001 |
19352 |
003 |
IGIG |
005 |
20111128142906.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
111119s2011 pau fsb 000 0 eng d |
010 |
# |
# |
|z 2011019909
|
020 |
# |
# |
|a 9781609608378 (ebook)
|
020 |
# |
# |
|z 9781609608361 (hardcover)
|
020 |
# |
# |
|z 9781609608385 (print & perpetual access)
|
024 |
7 |
# |
|a 10.4018/978-1-60960-836-1
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00550221
|
035 |
# |
# |
|a (OCoLC)764494314
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a TK5105.59
|b .P757 2011e
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
0 |
0 |
|a Privacy, intrusion detection, and response
|b technologies for protecting networks /
|c Peyman Kabiri, editor.
|h [electronic resource] :
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c 2011.
|
300 |
# |
# |
|a electronic texts (241 p.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references.
|
505 |
0 |
# |
|a 1. A structured approach to selecting data collection mechanisms for intrusion detection / Ulf E. Larson, Erland Jonsson and Stefan Lindskog -- 2. Protecting enterprise networks: an intrusion detection technique based on auto-reclosing / Nana K. Ampah and Cajetan M. Akujuobi -- 3. Usage of broadcast messaging in a distributed hash table for intrusion detection / Zoltán Czirkos and Gábor Hosszú -- 4. An entropy-based architecture for intrusion detection in LAN traffic / P. Velarde-Alvarado ... [et al.] -- 5. Botnet behavior detection using network synchronism / Sebastián García, Alejandro Zunino and Marcelo Campo -- 6. Detecting denial of service attacks on SIP based services and proposing solutions / Zoha Asgharian ... [et al.] -- 7. Dimension reduction and its effects on clustering for intrusion detection / Peyman Kabiri and Ali Ghorbani -- 8. A subspace-based analysis method for anomaly detection in large and high-dimensional network connection data streams / Ji Zhang -- 9. Applying weighted PCA on multiclass classification for intrusion detection / Mohsen Moshki, Mehran Garmehi and Peyman Kabiri.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a " This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Description based on title screen (IGI Global, viewed November 19, 2011).
|
650 |
# |
0 |
|a Computer networks
|x Security measures.
|
653 |
# |
# |
|a Intrusion detection
|
653 |
# |
# |
|a Anomaly detection
|
653 |
# |
# |
|a Enterprise networks protection
|
653 |
# |
# |
|a Distributed intrusion detection
|
653 |
# |
# |
|a Data collection mechanisms
|
653 |
# |
# |
|a Network feature selection
|
653 |
# |
# |
|a Intrusion prevention
|
653 |
# |
# |
|a Intrusion response
|
653 |
# |
# |
|a Botnet behavior detection
|
653 |
# |
# |
|a DoS attack detection on SIP based services
|
700 |
1 |
# |
|a Kabiri, Peyman,
|d 1968-
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC)2011019909
|
776 |
0 |
8 |
|i Print version:
|w (DLC) 2011019909
|z 9781609608361
|z 1609608364
|
856 |
4 |
1 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-836-1
|3 Chapter PDFs via platform:
|