2008 | ||
---|---|---|
4 | EE | Karen Scarfone, Peter Mell: Vulnerability scoring for security configuration settings. QoP 2008: 3-8 |
2004 | ||
3 | Donald G. Marks, Peter Mell, Michael Stinson: Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents. J. Network Syst. Manage. 12(1): (2004) | |
2000 | ||
2 | EE | Peter Mell, Donald G. Marks, Mark McLarnon: A denial-of-service resistant intrusion detection architecture. Computer Networks 34(4): 641-658 (2000) |
1999 | ||
1 | EE | Peter Mell, Mark McLarnon: Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems. Recent Advances in Intrusion Detection 1999 |
1 | Donald G. Marks | [2] [3] |
2 | Mark McLarnon | [1] [2] |
3 | Karen Scarfone | [4] |
4 | Michael Stinson | [3] |