About
4
Publications
679
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
24
Citations
Publications
Publications (4)
In order to utilize benefits and remove disadvantages
of both misuse and anomaly based intrusion detection systems,
hybrid architectures has been offered. In the case of parallel
hybrid architecture, it’s necessary that a decision engine
combines both outputs of misuse and anomaly based detection
systems and infers the final result. Since ther...
In today's computing environments, Network Intrusion Detection and Prevention Systems (NIDPS) are one of the fundamental network components to monitor and analyze traffic to find possible attacks. Several works have been done to introduce an applicable NIDPS architecture, but none of them could cover all current NIDPS requirements. In this paper we...
Today modern computing systems leverage distributed models such as cloud, grid, etc. One of the obstacles of wide spreading these distributed computing models is security challenges which includes access control problem. These computing models because of providing features like on-demand self-service, ubiquitous network access, rapid elasticity and...