References
- Cert (2012). Cert/cc statistics. http://www.cert.org/stats/
- CheckPoint (2013). Check point 2013 security report January (2013). Retrieved September 23, 2013, from http://www.checkpoint.com/campaigns/security-report/.
- Conrad, J. (2012). Seeking help: The important role of ethical hackers. Network Security, 8, 5–8. doi: 10.1016/S1353-4858(12)70071-5
- Denman, S. (2012). Why multi-layered security is still the best defence. Network Security, 3, 5–7. doi: 10.1016/S1353-4858(12)70043-0
- Goodchild, J. (2010). Study: Advanced threats a growing problem for security. PCWorld, 30 June 2010. Retrieved September 23, 2013, from http://www.pcworld.com/businesscenter/article/200224/study-_advanced_threats_a_growing_problem_for_security.html
- Hilbert, E. (2013). Living with cybercrime. Network Security, 11, 15–17. doi: 10.1016/S1353-4858(13)70126-0
- Kim, Y., Kim, I., & Park, N. (2014). Analysis of cyber attacks and security intelligence. In James J. (Jong Hyuk) Park, H. Adeli, N. Park & I. Woungang (Eds.), Mobile, ubiquitous, and intelligent computing, Lecture Notes in Electrical Engineering, Vol. 274 (pp. 489–494). Berlin, Heidelberg: Springer.
- Kumar, G., & Kumar, K. (2011, July 21–22). AI based supervised classifiers: An analysis for intrusion detection. In A. Mantri & M. Khurana (Eds.), Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, Rajpura, Punjab (pp. 170–174). New York: ACM.
- Kumar, G., & Kumar, K. (2012). An information theoretic approach for feature selection. Security and Communication Networks, 5(2), 178–185. doi: 10.1002/sec.303
- Kumar, G., Kumar, K., & Sachdeva, M. (2010a). The use of artificial intelligence based techniques for intrusion detection: A review. Artificial Intelligence Review 34(4), 369–387. doi: 10.1007/s10462-010-9179-5
- Kumar, G., Kumar, K., & Sachdeva, M. (2010b). An empirical comparative analysis of feature reduction methods for intrusion detection. International Journal of Information and Telecommunication Technology, 1(1), 44–51.
- PandaLabs (2012). 2012 annual report pandalabs. Retrieved September 23, 2013, form http://press.pandasecurity.com/wp-content/uploads/2013/02/PandaLabs-Annual-Report-2012.pdf.
- PandaLabs (2013). Pandalabs quarterly report January – March 2013. Retrieved September 23, 2013, form http://press.pandasecurity.com/wp-content/uploads/2010/05/PandaLabs-Quaterly-Report.pdf
- Patcha, A., & Park, J. M. (2007). An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 51(12), 3448–3470. doi: 10.1016/j.comnet.2007.02.001
- Peng, T., Leckie, C., & Ramamohanarao, K. (2007). Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys (CSUR), 39(1), Article 3. doi: 10.1145/1216370.1216373
- Potts, M. (2012). The state of information security. Network Security, 2012(7), 9–11. doi: 10.1016/S1353-4858(12)70064-8
- Ramamohanarao, K., Gupta, K., Peng, T., & Leckie, C. (2007, December 16–20). The curse of ease of access to the internet. In P. McDaniel & S. K. Gupta (Eds.), Information Systems Security, Third International Conference, ICISS 2007 Proceedings, Delhi (pp. 234–249). Berlin Heidelberg: Springer.
- Sachdeva, M., Kumar, K., Singh, G., & Singh, K. (2009, March 6–7). Performance analysis of web service under ddos attacks. Proceedings of International Advance Computing Conference (IACC), Patiala, India (pp. 1002–1007). New York: IEEE.
- Schneider, D. (2012). The state of network security. Network Security, 2012(2), 14–20. doi: 10.1016/S1353-4858(12)70016-8
- Shakarian, P., Shakarian, J., & Ruef, A. (2013). Introduction to cyber-warfare: A multidisciplinary approach. Maryland Heights: Syngress Publishing.
- Verizon (2012). The 2012 data breach investigations report. Ret-rieved September 23, 2013, from http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf
- Verizon (2013). The 2013 data breach investigations report. Retrieved September 23, 2013, from http://www.verizonenterprise.com/resources/reports/rp_data-_breach-investigations-report-2013_en_xg.pdf
- Virvilis, N., & Gritzalis, D. (2013, September 2–6). The big four-what we did wrong in advanced persistent threat detection? Availability, Reliability and Security (ARES), 2013 Eighth International Conference on, Regensburg (pp. 248–254). New York: IEEE.