System and method for data loss prevention across heterogeneous communications platforms

M Brisebois, C Johnstone - US Patent 9,578,060, 2017 - Google Patents
In one embodiment, a method includes activating a cross platform DLP policy for
enforcement against a plurality of users on each of a plurality of heterogeneous communica …

Proactive detection of distributed denial of service attacks using mib traffic variables-a feasibility study

JBD Cabrera, L Lewis, X Qin, W Lee… - 2001 IEEE/IFIP …, 2001 - ieeexplore.ieee.org
We propose a methodology for utilizing network management systems for the early detection
of distributed denial of service (DDoS) attacks. Although there are quite a large number of …

Method and Apparatus for predicting and preventing attacks in communications networks

LM Lewis, JBD Cabrera, RK Mehra - US Patent 7,603,709, 2009 - Google Patents
In one embodiment of a method and apparatus for predicting and preventing network
attacks, data is collected from net work devices during an attack. The collected data is …

Explainable AI-based innovative hybrid ensemble model for intrusion detection

U Ahmed, Z Jiangbin, A Almogren, S Khan… - Journal of Cloud …, 2024 - Springer
Cybersecurity threats have become more worldly, demanding advanced detection
mechanisms with the exponential growth in digital data and network services. Intrusion …

Multi-agent systems for protecting critical infrastructures: A survey

ZA Baig - Journal of Network and Computer Applications, 2012 - Elsevier
Multi-agent systems have emerged as a very significant platform in provisioning distributed
and collaborative services to critical applications. Such applications require ubiquitous …

Systems and methods of patternizing logged user-initiated events for scheduling functions

MA Brisebois, AN Polikarpov… - US Patent 10,417,613, 2019 - Google Patents
In one embodiment, a method includes selecting a set of logged user-initiated events of a
user. The method further includes determining timing information, device-identification …

A survey on multi-agent based collaborative intrusion detection systems

N Bougueroua, S Mazouzi, M Belaoued… - Journal of Artificial …, 2021 - sciendo.com
Abstract Multi-Agent Systems (MAS) have been widely used in many areas like modeling
and simulation of complex phenomena, and distributed problem solving. Likewise, MAS …

Design and management of collaborative intrusion detection networks

CJ Fung, R Boutaba - 2013 IFIP/IEEE International Symposium …, 2013 - ieeexplore.ieee.org
Traditional intrusion detection systems (IDSs) work in isolation and are not effective to detect
unknown threats. An intrusion detection network (IDN) is a collaborative IDS network …

Proactive intrusion detection and distributed denial of service attacks—a case study in security management

JBD Cabrera, L Lewis, X Qin, W Lee… - Journal of Network and …, 2002 - Springer
Little or no integration exists today between Intrusion Detection Systems (IDSs) and SNMP-
based Network Management Systems (NMSs), in spite of the extensive monitoring and …

[PDF][PDF] A dynamic authentication scheme for mobile transactions

B Sathish Babu, P Venkataram - International Journal of Network …, 2009 - researchgate.net
Most of the existing authentication schemes for mobile communication are static in nature,
and principally dependent on strength of authenticating identifiers for users identity. The …