Shouman et al.
ViewPDFPublication | Publication Date | Title |
---|---|---|
JP4914052B2 (en) | Method and system for distributing security policies | |
US9106697B2 (en) | System and method for identifying unauthorized activities on a computer system using a data structure model | |
Locasto et al. | Flips: Hybrid adaptive intrusion prevention | |
US9386034B2 (en) | Behavioral model based malware protection system and method | |
EP2774072B1 (en) | System and method for transitioning to a whitelist mode during a malware attack in a network environment | |
US9167000B2 (en) | Dynamic threat event management system and method | |
Grégio et al. | Toward a taxonomy of malware behaviors | |
US20030084322A1 (en) | System and method of an OS-integrated intrusion detection and anti-virus system | |
US20120030731A1 (en) | System and Method for Local Protection Against Malicious Software | |
KR102189361B1 (en) | Managed detection and response system and method based on endpoint | |
Sequeira | Intrusion prevention systems: security's silver bullet? | |
Sayyed et al. | Intrusion detection system | |
Salah et al. | Surviving cyber warfare with a hybrid multiagent-base intrusion prevention system | |
Resmi et al. | Intrusion detection system techniques and tools: A survey | |
Shouman et al. | A Hybrid Multiagent-Based Intrusion Prevention System | |
Venkatraman | Autonomic context-dependent architecture for malware detection | |
Nguyen et al. | Cyberattack detection and prevention on resource-constrained IoT devices based on intelligent agents | |
Rajaallah et al. | Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System | |
Mira | An investigation of malware and the systems used to detect and identify malware | |
Agarwal et al. | Anti-forensic= suspicious: detection of stealthy malware that hides its network traffic | |
Shouman et al. | Multiagent-Based Intrusion Prevention System | |
Dyer et al. | Personal firewalls and intrusion detection systems | |
King et al. | CIDS: Causality Based Intrusion Detection System | |
Mira | Malware Detection and Identification Methods | |
El Hayat | Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System |