Intrusion Detection Message Exchange Format

Known as: IDMEF, IDMEF : Intrusion Detection Message Exchange Format 
Used as part of computer security, IDMEF (Intrusion Detection Message Exchange Format) is a data format used to exchange informations between… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2001-2018
024620012018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
Security incidents are becoming more serious and more common not only in computer networks, but also in automation networks… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
Now days, different kinds of IDS systems are available for serving in the network distributed system, but these systems mainly… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
Most of intrusion detection systems nowadays are not really distributed systems which cannot detect the distributed or… (More)
  • figure 1
  • table 1
Is this relevant?
2006
2006
Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
An important problem in the field of intrusion detection is the management of alerts. Intrusion Detection Systems tend to produce… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
Security alerts high-level reasoning efforts such as alert filtering and intrusion alert correlation are initiatives to solve… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 5
Is this relevant?
2004
2004
In a distributed intrusion detection system, multiple detection components are usually applied to monitor different hosts and… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
2004
2004
Intrusion Detection Systems (IDS) have been developed to solve the problem of detecting the attacks on several network systems… (More)
  • figure 1
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We state the benefits of transitioning from taxonomies to ontologies and ontology specification languages, which are able to… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
There are several approaches for intrusion detection but none of them is fully satisfactory. They generally generate too many… (More)
  • figure 1
  • figure 2
Is this relevant?