[PDF][PDF] Intrusion response systems: survey and taxonomy

A Shameli-Sendi, N Ezzati-Jivan… - Int. J. Comput. Sci …, 2012 - researchgate.net
This paper presents a taxonomy of intrusion response systems (IRS), classifying a number of
research papers published during the past decade that provide us with many valuable …

Taxonomy of intrusion risk assessment and response system

A Shameli-Sendi, M Cheriet, A Hamou-Lhadj - Computers & Security, 2014 - Elsevier
In recent years, we have seen notable changes in the way attackers infiltrate computer
systems compromising their functionality. Research in intrusion detection systems aims to …

Minimal complexity attack classification intrusion detection system

G Gowrison, K Ramar, K Muneeswaran… - Applied Soft Computing, 2013 - Elsevier
In general, the kind of users and the injection of network packets into the internet sectors are
not under specific control. There is no clear description as to what packets can be …

Complex network security analysis based on attack graph model

Z Liu, S Li, J He, D ** better intrusion detection system performance
SJ Fugate - 2012 - search.proquest.com
During the last three decades, the designers of computer Intrusion Detection System (IDS)
have been continuously challenged with performance bottlenecks and scalability issues …

МЕТОДИКА ВЫБОРА ОПТИМАЛЬНОГО СОСТАВА МЕР НЕЙТРАЛИЗАЦИИ ИНСАЙДЕРСКИХ УГРОЗ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ

МА Поляничко, АА Корниенко, КВ Пунанова - Двойные технологии, 2020 - elibrary.ru
Обеспечение информационной безопасности требует развития систем про
тиводействия злоумышленникам, имеющим легитимный доступ к информационным ак …