6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Acknowledgments<br />
Marco Carvalho et al.<br />
This material is partially based upon work supported by the Department of Energy National Energy<br />
Technology Laboratory under Award Number(s) DE-OE0000511.<br />
Disclaimer: Parts of this paper were prepared as an account of work sponsored by an agency of the<br />
United States Government. Neither the United States Government nor any agency thereof, nor any of<br />
their employees, makes any warranty, express or implied, or assumes any legal liability or<br />
responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or<br />
process disclosed, or represents that its use would not infringe privately owned rights. Reference<br />
herein to any specific commercial product, process, or service by trade name, trademark,<br />
manufacturer, or otherwise does not necessarily constitute or imply its endorsement,<br />
recommendation, or favoring by the United States Government or any agency thereof. The views and<br />
opinions of authors expressed herein do not necessarily state or reflect those of the United States<br />
Government or any agency thereof."<br />
References<br />
Abbes, T., Bouhoula, A., and Rusinowitch, M. (2004) “Protocol analysis in intrusion de- tection using decision<br />
tree,” in Information Technology: Coding and Computing, 2004. Proc. ITCC 2004. Intl. <strong>Conference</strong> on, vol.<br />
1.<br />
Benatallah, B., Hacid, M., Rey, C. and Toumani, F. (2003), “Semantic reasoning for web services discovery,” in<br />
Proc. of Workshop on E-Services and the Semantic Web at WWW 2003.<br />
Bradley, W. B., and Maher, D. P. (2004). The NEMO P2P Service Orchestration Framework. In Proceedings of<br />
the Proceedings of the 37th Annual Hawaii International <strong>Conference</strong> on System Sciences (HICSS'04) -<br />
Track 9 - Volume 9 (HICSS '04), Vol. 9. IEEE Computer Society, Washington, DC, USA, 90290.3-.<br />
Carvalho, M., Lamkin, T., Perez, C. (2010) Organic Resilience for Tactical Environments. 5 th International ICST<br />
Confernece on Bio-Inspired Models of Network, Information, and Computing Systems (Bionetics). Boston,<br />
MA, December, 2010.<br />
Carvalho, M. M., Pechoucek, M., and Suri, N. (2005) “A mobile agent-based middleware for opportunistic<br />
resource allocation and communications,” in DAMAS, pp. 121–134.<br />
Cho, S. and Park, H. (2003), “Efficient anomaly detection by modeling privilege flows using hidden Markov<br />
model,” Computers & Security, vol. 22, no. 1, pp. 45–55.<br />
Cohen, F. (1995), Protection and Security on the Information Superhighway, Wiley and Sons, 1995.<br />
Dasgupta, D. and Fabio Gonzalez, (2002), An immunity-based technique to characterize intrusions in computer<br />
networks, IEEE Trans. Evolutionary Comp. 6 (3), pp. 281–291, June 2002.<br />
Grimaila, M.R., “Improving the Cyber Incident Mission Impact Assessment Process,” Cyber Security and<br />
Information Intelligence Research Workshop (CSIIRW 2008), Oak Ridge National Laboratory, Oak Ridge,<br />
TN, May 12-14, 2008.<br />
Klusch, M., Fries, B., and Sycara, K. (2006) “Automated semantic web service discovery with OWLSMX,” in<br />
Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, pp.<br />
915–922, ACM.<br />
Lardieri, P., Balasubramanian, J., Schmidt, D. C., Thaker, G., Gokhale, A., and Damiano, T. (2007) “A multilayered<br />
resource management framework for dynamic re- source management in enterprise dre systems,”<br />
J. Syst. Softw., vol. 80, no. 7, pp. 984–996.<br />
Liang, Gang. (2006) An Immunity-Based Dynamic Multilayer Intrusion Detection System, Lecture Notes In<br />
Computer Science. Heidelberg: Springer Berlin 2006.<br />
Li, X., and Ye, N. (2001) “Decision tree classifiers for computer intrusion detection,” Jour- nal of Parallel and<br />
Distributed Computing Practices, vol. 4, no. 2, pp. 179–190.<br />
Lord, P., Alper, P., Wroe, C., and Goble, C. (2005) “Feta: A light-weight architecture for user oriented semantic<br />
service discovery,” The Semantic Web: Research and Applications, pp. 17–31.<br />
Microsoft (2010) “BizTalk Server”, http://www.microsoft.com/biztalk/en/us/host-integration.aspx<br />
Musman, S., Temin, A., Tanner, M., Fox, D. and Pridemore, B. (2010) “Evaluating the impact of cyber attacks on<br />
missions,” in 5th International <strong>Conference</strong> on Information Warfare and Security. Wright-<br />
OASIS, (2002) “UDDI Specifications.” http://www.oasis-open.org/committees/uddi-spec/doc/ tcspecs.htm.<br />
OASIS, (2009) “Web Services Dynamic Discovery (WS-Discovery).” Available online at: http://docs.oasisopen.org/ws-dd/discovery/1.1/wsdd-discovery-1.1-spec.html.<br />
Ourston, D., Matzner, S., Stump, W., and Hopkins, B. (2003) “Applications of hidden markov models to detecting<br />
multi-stage network attacks,” Proceedings of the 3<strong>6th</strong> Annual Hawaii International <strong>Conference</strong> on System<br />
Sciences, p. 10.<br />
Papazoglou, M., Traverso, P., Dustdar, S., and Leymann, F. (2008) “Service-oriented computing: A research<br />
roadmap,” Intl. Journal of Cooperative Information Systems, vol. 17, no. 2, pp. 223–255.<br />
Patterson AFB, Ohio, USA: Air Force Institute of Technology, April 8-9, pp. 446–456.<br />
Ranjan, R., Zhao, L., Wu, X., Liu, A., Quiroz, A., and Parashar, M. (2010) “Peer-to-Peer Cloud Provisioning:<br />
Service Discovery and Load-Balancing,” Cloud Computing, pp. 195–217.<br />
50