The zombie roundup: Understanding, detecting, and disrupting botnets, Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), pp.39-44, 2005. ,
Dynamic rule-ordering optimization for high-speed firewall filtering, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, pp.332-342, 2006. ,
DOI : 10.1145/1128817.1128867
Dempster's rule as seen by little coloured balls, Information Fusion Journal, 2005. ,
Understanding Internet traffic streams: dragonflies and tortoises, IEEE Communications Magazine, vol.40, issue.10, pp.110-117, 2002. ,
DOI : 10.1109/MCOM.2002.1039865
On power-law relationships of the internet topology, SIGCOMM, pp.251-262, 1999. ,
Distributed firewalls, 1999. ,
Implementing a distributed firewall, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.190-199, 2000. ,
DOI : 10.1145/352600.353052
Indra: a peer-to-peer approach to network intrusion detection and prevention, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003., pp.226-231 ,
DOI : 10.1109/ENABL.2003.1231412
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System, pp.244-253, 2004. ,
DOI : 10.1007/978-3-540-30178-3_23
Steps toward and intelligent firewall a basic model, Proc. Conference on Information Security for South Africa (ISSA2003), pp.9-11, 2003. ,
Packetscore: A statistics-based packet filtering scheme against distributed denial-ofservice attacks, IEEE Transactions on Dependable and Secure Computing, vol.3, issue.2, pp.141-155, 2006. ,
Controlling high bandwidth aggregates in the network, ACM SIGCOMM Computer Communication Review, vol.32, issue.3, pp.62-73, 2002. ,
DOI : 10.1145/571697.571724
Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs, Proceedings of 8th Australasian Conference on Information Security and Privacy, pp.214-225, 2003. ,
DOI : 10.1007/3-540-45067-X_19