References 229
[85] J. Jang, D. Brumley, and S. Venkataraman. Bitshred: feature hashing malware
for scalable triage and semantic analysis. In Proceedings of the 18th ACM
conference on Computer and communications security, pages 309–320. ACM,
2011.
[86] T. Jiang and J. S. Baras. Trust evaluation in anarchy: A case study on au-
tonomous networks. In INFOCOM. IEEE, 2006.
[87] A. Jøsang and R. Ismail. The Beta Reputation System. In Proceedings of the
Fifteenth Bled Electronic Commerce Conference, 2002.
[88] J. H. Keppler and H. Mountford. Handbook of Incentive Measures for Biodi-
versity: Design and Implementation. OECD, 1999.
[89] C. Kolbitsch, P. M. Comparetti, C. Kruegel, E. Kirda, X. Zhou, and X. F.
Wang. Effective and efficient malware detection at the end host. In Proceed-
ings of the 18th Conference on USENIX Security Symposium, pages 351–366.
USENIX Association, 2009.
[90] D. Komashinskiy and I. Kotenko. Malware detection by data mining tech-
niques based on positionally dependent features. In Parallel, Distributed and
Network-Based Processing (PDP), 2010 18th Euromicro International Con-
ference on, pages 617–623. IEEE, 2010.
[91] Y. A. Korilis and A. A. Lazar. On the existence of equilibria in noncooperative
optimal flow control. Journal of the ACM (JACM), 42(3):584–613, 1995.
[92] A. Le, R. Boutaba, and E. Al-Shaer. Correlation-based load balancing for
network intrusion detection and prevention systems. In Proceedings of the
4th International Conference on Security and Privacy in Communication Net-
work. ACM, New York, NY, 2008.
[93] B. C. Levy. Principles of Signal Detection and Parameter Estimation.
Springer-Verlag, 2008.
[94] Z. Li, Y. Chen, and A. Beach. Towards scalable and robust distributed in-
trusion alert fusion with good load balancing. In Proceedings of the 2006
SIGCOMM Workshop on Large-Scale Attack Defense, pages 115–122. ACM
New York, NY, 2006.
[95] Z. Li, Y. Chen, and A. Beach. Towards scalable and robust distributed in-
trusion alert fusion with good load balancing. In Proceedings of the 2006
SIGCOMM Workshop on Large-Scale Attack Defense. ACM, 2006.
[96] W. Lin, L. Xiang, D. Pao, and B. Liu. Collaborative Distributed Intrusion
Detection System. In Future Generation Communication and Networking,
2008. FGCN’08. Second International Conference on, volume 1, 2008.

Get Intrusion Detection Networks now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.