27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Acknowledgments<br />

Marco Carvalho et al.<br />

This material is partially based upon work supported by the Department of Energy National Energy<br />

Technology Laboratory under Award Number(s) DE-OE0000511.<br />

Disclaimer: Parts of this paper were prepared as an account of work sponsored by an agency of the<br />

United States Government. Neither the United States Government nor any agency thereof, nor any of<br />

their employees, makes any warranty, express or implied, or assumes any legal liability or<br />

responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or<br />

process disclosed, or represents that its use would not infringe privately owned rights. Reference<br />

herein to any specific commercial product, process, or service by trade name, trademark,<br />

manufacturer, or otherwise does not necessarily constitute or imply its endorsement,<br />

recommendation, or favoring by the United States Government or any agency thereof. The views and<br />

opinions of authors expressed herein do not necessarily state or reflect those of the United States<br />

Government or any agency thereof."<br />

References<br />

Abbes, T., Bouhoula, A., and Rusinowitch, M. (2004) “Protocol analysis in intrusion de- tection using decision<br />

tree,” in Information Technology: Coding and Computing, 2004. Proc. ITCC 2004. Intl. <strong>Conference</strong> on, vol.<br />

1.<br />

Benatallah, B., Hacid, M., Rey, C. and Toumani, F. (2003), “Semantic reasoning for web services discovery,” in<br />

Proc. of Workshop on E-Services and the Semantic Web at WWW 2003.<br />

Bradley, W. B., and Maher, D. P. (2004). The NEMO P2P Service Orchestration Framework. In Proceedings of<br />

the Proceedings of the 37th Annual Hawaii International <strong>Conference</strong> on System Sciences (HICSS'04) -<br />

Track 9 - Volume 9 (HICSS '04), Vol. 9. IEEE Computer Society, Washington, DC, USA, 90290.3-.<br />

Carvalho, M., Lamkin, T., Perez, C. (2010) Organic Resilience for Tactical Environments. 5 th International ICST<br />

Confernece on Bio-Inspired Models of Network, Information, and Computing Systems (Bionetics). Boston,<br />

MA, December, 2010.<br />

Carvalho, M. M., Pechoucek, M., and Suri, N. (2005) “A mobile agent-based middleware for opportunistic<br />

resource allocation and communications,” in DAMAS, pp. 121–134.<br />

Cho, S. and Park, H. (2003), “Efficient anomaly detection by modeling privilege flows using hidden Markov<br />

model,” Computers & Security, vol. 22, no. 1, pp. 45–55.<br />

Cohen, F. (1995), Protection and Security on the Information Superhighway, Wiley and Sons, 1995.<br />

Dasgupta, D. and Fabio Gonzalez, (2002), An immunity-based technique to characterize intrusions in computer<br />

networks, IEEE Trans. Evolutionary Comp. 6 (3), pp. 281–291, June 2002.<br />

Grimaila, M.R., “Improving the Cyber Incident Mission Impact Assessment Process,” Cyber Security and<br />

Information Intelligence Research Workshop (CSIIRW 2008), Oak Ridge National Laboratory, Oak Ridge,<br />

TN, May 12-14, 2008.<br />

Klusch, M., Fries, B., and Sycara, K. (2006) “Automated semantic web service discovery with OWLSMX,” in<br />

Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, pp.<br />

915–922, ACM.<br />

Lardieri, P., Balasubramanian, J., Schmidt, D. C., Thaker, G., Gokhale, A., and Damiano, T. (2007) “A multilayered<br />

resource management framework for dynamic re- source management in enterprise dre systems,”<br />

J. Syst. Softw., vol. 80, no. 7, pp. 984–996.<br />

Liang, Gang. (2006) An Immunity-Based Dynamic Multilayer Intrusion Detection System, Lecture Notes In<br />

Computer Science. Heidelberg: Springer Berlin 2006.<br />

Li, X., and Ye, N. (2001) “Decision tree classifiers for computer intrusion detection,” Jour- nal of Parallel and<br />

Distributed Computing Practices, vol. 4, no. 2, pp. 179–190.<br />

Lord, P., Alper, P., Wroe, C., and Goble, C. (2005) “Feta: A light-weight architecture for user oriented semantic<br />

service discovery,” The Semantic Web: Research and Applications, pp. 17–31.<br />

Microsoft (2010) “BizTalk Server”, http://www.microsoft.com/biztalk/en/us/host-integration.aspx<br />

Musman, S., Temin, A., Tanner, M., Fox, D. and Pridemore, B. (2010) “Evaluating the impact of cyber attacks on<br />

missions,” in 5th International <strong>Conference</strong> on Information Warfare and Security. Wright-<br />

OASIS, (2002) “UDDI Specifications.” http://www.oasis-open.org/committees/uddi-spec/doc/ tcspecs.htm.<br />

OASIS, (2009) “Web Services Dynamic Discovery (WS-Discovery).” Available online at: http://docs.oasisopen.org/ws-dd/discovery/1.1/wsdd-discovery-1.1-spec.html.<br />

Ourston, D., Matzner, S., Stump, W., and Hopkins, B. (2003) “Applications of hidden markov models to detecting<br />

multi-stage network attacks,” Proceedings of the 3<strong>6th</strong> Annual Hawaii International <strong>Conference</strong> on System<br />

Sciences, p. 10.<br />

Papazoglou, M., Traverso, P., Dustdar, S., and Leymann, F. (2008) “Service-oriented computing: A research<br />

roadmap,” Intl. Journal of Cooperative Information Systems, vol. 17, no. 2, pp. 223–255.<br />

Patterson AFB, Ohio, USA: Air Force Institute of Technology, April 8-9, pp. 446–456.<br />

Ranjan, R., Zhao, L., Wu, X., Liu, A., Quiroz, A., and Parashar, M. (2010) “Peer-to-Peer Cloud Provisioning:<br />

Service Discovery and Load-Balancing,” Cloud Computing, pp. 195–217.<br />

50

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!