Grey Theory Based Nodes Risk Assessment in P2P Networks, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, pp.479-483, 2009. ,
DOI : 10.1109/ISPA.2009.45
Netbait: a Distributed Worm Detection Service, 2003. ,
A Trust-Aware, P2P-Based Overlay for Intrusion Detection, 17th International Conference on Database and Expert Systems Applications (DEXA'06), pp.692-697, 2006. ,
DOI : 10.1109/DEXA.2006.21
Trust Management for Host-Based Collaborative Intrusion Detection, DSOM 2008, pp.109-122, 2008. ,
DOI : 10.1145/1151454.1151495
Robust and scalable trust management for collaborative intrusion detection, 2009 IFIP/IEEE International Symposium on Integrated Network Management, pp.33-40, 2009. ,
DOI : 10.1109/INM.2009.5188784
Bayesian decision aggregation in collaborative intrusion detection networks, 2010 IEEE Network Operations and Management Symposium, NOMS 2010, pp.349-356, 2010. ,
DOI : 10.1109/NOMS.2010.5488489
Detecting anomalous and unknown intrusions against programs, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), pp.259-267, 1998. ,
DOI : 10.1109/CSAC.1998.738646
The Architecture of PIER: an Internet- Scale Query Processor, Proceedings of the 2005 Conference on Innovative Data Systems Research (CIDR), pp.28-43, 2005. ,
Indra: a peer-to-peer approach to network intrusion detection and prevention, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003., pp.226-231, 2003. ,
DOI : 10.1109/ENABL.2003.1231412
Future Trust Management Framework for Mobile Ad Hoc Networks, IEEE Communications Magazine, vol.46, issue.2, pp.108-114, 2008. ,
Towards scalable and robust distributed intrusion alert fusion with good load balancing, Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense , LSAD '06, pp.115-122, 2006. ,
DOI : 10.1145/1162666.1162669
Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges, 2013 Ninth International Conference on Computational Intelligence and Security, pp.518-522, 2013. ,
DOI : 10.1109/CIS.2013.115
Adaptive False Alarm Filter Using Machine Learning in Intrusion Detection, Proceddings of the 6th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), pp.573-584, 2011. ,
DOI : 10.1007/978-3-642-25658-5_68
Towards Designing Packet Filter with A Trustbased Approach Using Bayesian Inference in Network Intrusion Detection, Proceedings of The 8th International Conference on Security and Privacy in Communication Networks (SECURECOMM), pp.203-221, 2012. ,
COS- SACK: Coordinated Suppression of Simultaneous Attacks, Proceedings of the 2003 DARPA Information Survivability Conference and Exposition (DISCEX), pp.94-96, 2003. ,
Emerald: Event Monitoring Enabling Responses to Anomalous Live Disturbances, Proceedings of the 20th National Information Systems Security Conference, pp.353-365, 1997. ,
Fuzzy Dynamic Programming Based Trusted Routing Decision in Mobile Ad Hoc Networks, 2008 Fifth IEEE International Symposium on Embedded Computing, pp.180-185, 2008. ,
DOI : 10.1109/SEC.2008.46
B-Trust: Bayesian Trust Framework for Pervasive Computing, LNCS, vol.3986, pp.298-312, 2006. ,
DOI : 10.1007/11755593_22
Snort: Lightweight Intrusion Detection for Networks, Proceedings of the 13th USENIX Conference on System Administration (LISA), pp.229-238, 1999. ,
Reputation systems, Communications of the ACM, vol.43, issue.12, pp.45-48, 2000. ,
DOI : 10.1145/355112.355122
Guide to Intrusion Detection and Prevention Systems (IDPS), pp.800-894, 2007. ,
DOI : 10.6028/NIST.SP.800-94
DIDS (Distributed Intrusion Detection System) -Motivation, Architecture, and An Early Prototype, Proceedings of the 14th National Computer Security Conference, pp.167-176, 1991. ,
Information Theoretic Framework of Trust Modelling and Evaluation for Ad Hoc Networks, IEEE Journal of Selected Areas in Communications, vol.24, issue.2, pp.305-317, 2006. ,
A Game-Theoretic Analysis of Trust Management in P2P Systems, 2006 First International Conference on Communications and Electronics, pp.130-134, 2006. ,
DOI : 10.1109/CCE.2006.350832
NetSTAT: a network-based intrusion detection approach, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), pp.25-34, 1998. ,
DOI : 10.1109/CSAC.1998.738566
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS, Proceedings of the 2003 Annual Computer Security Applications Conference (ACSAC), pp.234-244, 2003. ,
Global Intrusion Detection in the DOMINO Overlay System, Proceedings of the 2004 Network and Distributed System Security Symposium (NDSS), pp.1-17, 2004. ,