Multiple Instance Learning for Malware Classification. | 4 | 0.46 | 2018 |
Probabilistic analysis of dynamic malware traces. | 0 | 0.34 | 2018 |
Reducing false positives of network anomaly detection by local adaptive multivariate smoothing. | 6 | 0.40 | 2017 |
Using Behavioral Similarity for Botnet Command-and-Control Discovery. | 2 | 0.36 | 2016 |
Intelligent Cybersecurity Agents [Guest editors' introduction]. | 4 | 0.40 | 2016 |
Detecting DGA malware using NetFlow | 14 | 0.69 | 2015 |
Game Theoretical Model for Adaptive Intrusion Detection System. | 0 | 0.34 | 2014 |
Malware detection using HTTP user-agent discrepancy identification | 2 | 0.51 | 2014 |
Game Theoretical Adaptation Model for Intrusion Detection System. | 0 | 0.34 | 2012 |
Self-organized collaboration of distributed IDS sensors | 0 | 0.34 | 2012 |
Identifying skype nodes in the network exploiting mutual contacts | 0 | 0.34 | 2012 |
Self-Organized Mechanism for Distributed Setup of Multiple Heterogeneous Intrusion Detection Systems | 1 | 0.37 | 2012 |
Trust-based Solution for Robust Self-configuration of Distributed Intrusion Detection Systems. | 2 | 0.38 | 2012 |
Revealing Cooperating Hosts by Connection Graph Analysis. | 1 | 0.36 | 2012 |
Distributed self-organized collaboration of autonomous IDS sensors | 1 | 0.36 | 2012 |
Identifying Skype nodes by NetFlow-based graph analysis | 0 | 0.34 | 2012 |
Game Theoretical Adaptation Model for Intrusion Detection System - Demo Paper. | 0 | 0.34 | 2012 |
Towards efficient flow sampling technique for anomaly detection | 4 | 0.43 | 2012 |
On the Value of Coordination in Distributed Self-Adaptation of Intrusion Detection System | 1 | 0.37 | 2011 |
Intelligence, not integration: Distributed regret minimization for IDS Control | 0 | 0.34 | 2011 |
Optimizing flow sampling for network anomaly detection | 7 | 0.56 | 2011 |
Game theoretical adaptation model for intrusion detection system | 3 | 0.43 | 2011 |
Dynamic information source selection for intrusion detection systems | 11 | 0.80 | 2009 |
Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes | 0 | 0.34 | 2009 |
Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems | 13 | 1.11 | 2009 |
Adaptive Multiagent System for Network Traffic Monitoring | 25 | 1.37 | 2009 |
Threat-model-driven runtime adaptation and evaluation of intrusion detection system | 2 | 0.36 | 2009 |
Multi-agent approach to network intrusion detection | 3 | 0.36 | 2008 |
Trust-Based Classifier Combination for Network Anomaly Detection | 10 | 0.89 | 2008 |
Incrementally Refined Acquaintance Model for Consortia Composition | 0 | 0.34 | 2008 |
Improving Anomaly Detection Error Rate by Collective Trust Modeling | 2 | 0.42 | 2008 |
CAMNEP: agent-based network intrusion detection system | 6 | 0.48 | 2008 |
High-Performance Agent System for Intrusion Detection in Backbone Networks | 3 | 0.55 | 2007 |
Incrementally Refined Acquaintance Model for Distributed Planning and Resource Allocation in Semi-trusted Environments | 0 | 0.34 | 2007 |
Collaborative Attack Detection in High-Speed Networks | 2 | 0.37 | 2007 |
Trust Modeling with Context Representation and Generalized Identities | 39 | 1.90 | 2007 |
Agent-Based Network Intrusion Detection System | 6 | 0.50 | 2007 |
Agent-Based Network Protection Against Malicious Code | 0 | 0.34 | 2007 |
Multi-agent Reflection in Autonomic Systems | 0 | 0.34 | 2007 |
Detecting Intrusions in Agent System by Means of Exception Handling | 0 | 0.34 | 2007 |
Network Intrusion Detection by Means of Community of Trusting Agents | 6 | 0.67 | 2007 |
High-Speed Network Traffic Acquisition for Agent Systems | 5 | 0.43 | 2007 |
Multilevel approach to agent-based task allocation in transportation | 0 | 0.34 | 2006 |
Representing Context for Multiagent Trust Modeling | 24 | 1.05 | 2006 |
Deployment of A-globe multi-agent platform | 5 | 0.72 | 2006 |
Towards formal model of adversarial action in multi-agent systems | 0 | 0.34 | 2006 |
Fuzzy number approach to trust in coalition environment | 1 | 0.38 | 2005 |
Solving inaccessibility in multi-agent systems by mobile middle-agents | 3 | 0.44 | 2005 |
Adversarial behavior in multi-agent systems | 0 | 0.34 | 2005 |
Expectations and deployment of agent technology in manufacturing and defence: case studies | 9 | 0.87 | 2005 |