|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 613 occurrences of 473 keywords
|
|
|
Results
Found 1750 publication records. Showing 1750 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
133 | Ambareen Siraj, Rayford B. Vaughn |
A Cognitive Model for Alert Correlation in a Distributed Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 218-230, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
intelligent alert fusion, fuzzy cognitive modeling, Network security, alert correlation |
108 | Seong Ho Lee, HyungHyo Lee, BongNam Noh |
A Rule-Based Intrusion Alert Correlation System for Integrated Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part I, pp. 365-372, 2004, Springer, 3-540-22114-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
96 | Dong Yu 0001, Deborah A. Frincke |
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (2) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2, pp. 142-147, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
alert confidence fusion, hidden colored Petri-Net, intrusion detection system, alert correlation, Dempster-Shafer theory of evidence |
93 | Yi-Min Wang, Paramvir Bahl, Wilf Russell |
The SIMBA User Alert Service Architecture for Dependable Alert Delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 1-4 July 2001, Göteborg, Sweden, Proceedings, pp. 463-474, 2001, IEEE Computer Society, 0-7695-1101-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
92 | Jingmin Zhou, Mark R. Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop |
Modeling network intrusion detection alerts for correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(1), pp. 4, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
alert fusion, intrusion detection, capability, Alert correlation |
89 | Yu Weng, Changjun Hu, Xiaoming Zhang |
ADEB: A Dynamic Alert Degree Evaluation Model for Blogosphere. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb/WAIM Workshops ![In: Advances in Web and Network Technologies, and Information Management, APWeb/WAIM 2009 International Workshops: WCMT 2009, RTBI 2009, DBIR-ENQOIR 2009, PAIS 2009, Suzhou, China, April 2-4, 2009, Revised Selected Papers, pp. 77-87, 2009, Springer, 978-3-642-03995-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
89 | Dingbang Xu, Peng Ning |
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 537-546, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
89 | Nen-Fu Huang, Hsien-Wei Hung, Chia-Nan Kao, Gin-Yuan Jai, Yi-Ju Sung |
Construct Efficient Hyper-alert Correlation for Defense-in-Depth Network Security System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Networking Technologies for Broadband and Mobile Networks, International Conference ICOIN 2004, Busan, Korea, February 18-20, 2004, Revised Selected Papers, pp. 886-894, 2004, Springer, 3-540-23034-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
89 | Jinqiao Yu, Y. V. Ramana Reddy, Sentil Selliah, Srinivas Kankanahalli, Sumitra Reddy, Vijayanand Bharadwaj |
TRINETR: An Intrusion Detection Alert Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), Infrastructure for Collaborative Enterprises, 14-16 June 2004, Modena, Italy, pp. 235-240, 2004, IEEE Computer Society, 0-7695-2183-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
81 | Hervé Debar, Andreas Wespi |
Aggregation and Correlation of Intrusion-Detection Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings, pp. 85-103, 2001, Springer, 3-540-42702-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
alert aggregation, alert data model, Intrusion detection, alert correlation |
79 | Chengpo Mu, Houkuan Huang, Shengfeng Tian |
Intrusion Detection Alert Verification Based on Multi-level Fuzzy Comprehensive Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (1) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I, pp. 9-16, 2005, Springer, 3-540-30818-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
79 | Dickson K. W. Chiu, Benny W. C. Kwok, Ray L. S. Wong, Shing-Chi Cheung, Eleanna Kafeza |
Alert-Driven E-Service Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
78 | Shilad Sen, Werner Geyer, Michael J. Muller, Marty Moore, Beth Brownholtz, Eric Wilcox, David R. Millen |
FeedMe: a collaborative alert filtering system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW ![In: Proceedings of the 2006 ACM Conference on Computer Supported Cooperative Work, CSCW 2006, Banff, Alberta, Canada, November 4-8, 2006, pp. 89-98, 2006, ACM, 1-59593-249-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
activity explorer, alert filtering, interruption management, collaborative filtering, bayesian, attention management |
78 | Xinzhou Qin, Wenke Lee |
Statistical Causality Analysis of INFOSEC Alert Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings, pp. 73-93, 2003, Springer, 3-540-40878-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
attack scenario analysis, Intrusion detection, time series analysis, alert correlation |
77 | Shahrulniza Musa, David J. Parish |
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings, pp. 169-180, 2008, Springer, 978-3-540-85931-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
alert visualization, network security information visualization, alert classification, machine learning |
73 | Phillip A. Porras, Martin W. Fong, Alfonso Valdes |
A Mission-Impact-Based Approach to INFOSEC Alarm Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 95-114, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
intrusion report correlation, alert management, alert prioritization, Network security |
70 | Moon Sun Shin, Kyeong Ja Jeong |
An Alert Data Mining Framework for Network-Based Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 38-53, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
70 | Myung-Jin Lee, Moon Sun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim |
Design and Implementation of Alert Analyzer with Data Mining Engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning, 4th International Conference, IDEAL 2003, Hong Kong, China, March 21-23, 2003, Revised Papers, pp. 1107-1112, 2003, Springer, 3-540-40550-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
69 | Hamed Ketabdar, Kamer Ali Yüksel |
Smart ring: controlling call alert functionality based on audio and movement analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IUI ![In: Proceedings of the 15th International Conference on Intelligent User Interfaces, IUI 2010, Hong Kong, China, February 7-10, 2010, pp. 415-416, 2010, ACM, 978-1-60558-515-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
ambient audio, ambient context, call alert functionality, physical movements, acceleration sensors |
69 | James Aspnes, Navin Rustagi, Jared Saia |
Worm Versus Alert: Who Wins in a Battle for Control of a Large-Scale Network?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 11th International Conference, OPODIS 2007, Guadeloupe, French West Indies, December 17-20, 2007. Proceedings, pp. 443-456, 2007, Springer, 978-3-540-77095-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Self-certifying alert, epidemic processes, peer-to-peer, overlay network, worm, expander graphs |
69 | Alfonso Valdes, Keith Skinner |
Probabilistic Alert Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings, pp. 54-68, 2001, Springer, 3-540-42702-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
sensor correlation, alert management, Network security, adaptive systems |
68 | Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer |
A Comprehensive Approach to Intrusion Detection Alert Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 1(3), pp. 146-169, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
alert reduction, correlation data sets, Intrusion detection, alert correlation |
63 | Frédéric Cuppens |
Managing Alerts in a Multi-Intrusion Detection Environmen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 22-31, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
IDMEF, cooperative intrusion detection, alert clustering, alert merging, IDS, DTD |
61 | Donghai Tian, Changzhen Hu, Yang Qi, Jianqiao Wang |
Hierarchical Distributed Alert Correlation Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 765-768, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Vinod Namboodiri, Abtin Keshavarzian |
Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks, IPSN 2008, St. Louis, Missouri, USA, April 22-24, 2008, pp. 159-170, 2008, IEEE Computer Society, 978-0-7695-3157-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, MAC Protocol |
61 | Najwa A. Bakar, Bahari Belaton |
Towards Implementing Intrusion Alert Quality Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFMA ![In: 1st International Conference on Distributed Frameworks for Multimedia Applications (DFMA 2005), 6-9 February 2005, Besançon, France, pp. 198-205, 2005, IEEE Computer Society, 0-7695-2273-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Dickson K. W. Chiu, Samuel P. M. Choi |
Alert Driven Communications Management for Distance Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March - 1 April 2005, Hong Kong, China, pp. 570-575, 2005, IEEE Computer Society, 0-7695-2274-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
59 | Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers |
Alert Verification Evasion Through Server Response Forging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 256-275, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Alert Verification, Network Intrusion Detection, Exploits, Evasion |
59 | Jouni Viinikka, Hervé Debar |
Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 166-187, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
IDS background noise, alert volume reduction, EWMA |
58 | Sarah Smith Heckman, Laurie A. Williams |
On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEM ![In: Proceedings of the Second International Symposium on Empirical Software Engineering and Measurement, ESEM 2008, October 9-10, 2008, Kaiserslautern, Germany, pp. 41-50, 2008, ACM, 978-1-59593-971-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
alert classification, alert prioritization, automated static analysis, benchmark creation, false positive mitigation |
58 | Frédéric Cuppens, Alexandre Miège |
Alert Correlation in a Cooperative Intrusion Detection Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002, pp. 202-215, 2002, IEEE Computer Society, 0-7695-1543-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Cooperative Intrusion Detection, IDMEF, Alert Merging, Alert Correlation |
56 | Mark Sherriff, Sarah Smith Heckman, J. Michael Lake, Laurie A. Williams |
Using groupings of static analysis alerts to identify files likely to contain field failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007, Dubrovnik, Croatia, September 3-7, 2007, pp. 565-568, 2007, ACM, 978-1-59593-811-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
field failures, static analysis, singular value decomposition |
51 | Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee |
Alert propagation in mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(1), pp. 23-25, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Yan Zhai, Peng Ning, Jun Xu 0003 |
Integrating IDS Alert Correlation and OS-Level Dependency Tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 272-284, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
51 | Wen-Yi Hsin, Shun-Chieh Lin, Shian-Shyong Tseng |
A Study of Alert-Based Collaborative Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 8th International Symposium on Parallel Architectures, Algorithms, and Networks, ISPAN 2005, December 7-9. 2005, Las Vegas, Nevada, USA, pp. 148-153, 2005, IEEE Computer Society, 0-7695-2509-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Xinguo Yu, Xin Yan 0001, Liyuan Li, Hon Wai Leong |
An instant semantics acquisition system of live soccer video with application to live event alert and on-the-fly language selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIVR ![In: Proceedings of the 7th ACM International Conference on Image and Video Retrieval, CIVR 2008, Niagara Falls, Canada, July 7-9, 2008, pp. 495-504, 2008, ACM, 978-1-60558-070-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Gamelog, icon-based input, instant semantics acquisition, live event alert, on-the-fly language selection, sports video |
47 | Dickson K. W. Chiu, Benny W. C. Kwok, Ray L. S. Wong, Shing-Chi Cheung, Eleanna Kafeza, Marina Kafeza |
Alerts for Healthcare Process and Data Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Peng Ning, Yun Cui, Douglas S. Reeves |
Analyzing Intensive Intrusion Alerts via Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 74-94, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Attack Scenario Analysis, Intrusion Detection, Alert Correlation |
42 | Lina Zhu 0001, Chao-yi Sun, Li Feng |
Research on Early Warning for Worm Propagation Based on Area-Alert-Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 163-166, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Khalid Alsubhi, Ehab Al-Shaer, Raouf Boutaba |
Alert prioritization in Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 33-40, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Tianning Zang, Xiao-chun Yun, Yongzheng Zhang 0002 |
A Survey of Alert Fusion Techniques for Security Incident. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: The Ninth International Conference on Web-Age Information Management, WAIM 2008, July 20-22, 2008, Zhangjiajie, China, pp. 475-481, 2008, IEEE Computer Society, 978-0-7695-3185-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Jie Ma, Zhitang Li, Weiming Li |
Real-Time Alert Stream Clustering and Correlation for Discovering Attack Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (4) ![In: Fifth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 18-20 October 2008, Jinan, Shandong, China, Proceedings, Volume 4, pp. 379-384, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis |
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 367-376, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Marcus Lucas da Silva, Mitsuji Matsumoto |
A Proposal of a Platform for Alert Notification and Response Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: Third International Conference on Networking and Services (ICNS 2007), June 19-25, 2007, Athens, Greece, pp. 111, 2007, IEEE Computer Society, 978-0-7695-2858-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Moon Sun Shin, Kyeong Ja Jeong |
Alert Correlation Analysis in Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, Second International Conference, ADMA 2006, Xi'an, China, August 14-16, 2006, Proceedings, pp. 1049-1056, 2006, Springer, 3-540-37025-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Jing-Xin Wang, Zhiying Wang 0003, Kui Dai |
Intrusion Alert Analysis Based on PCA and the LVQ Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP (3) ![In: Neural Information Processing, 13th International Conference, ICONIP 2006, Hong Kong, China, October 3-6, 2006, Proceedings, Part III, pp. 217-224, 2006, Springer, 3-540-46484-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Vandana Pursnani Janeja, Vijayalakshmi Atluri, Ahmed Gomaa, Nabil R. Adam, Christof Bornhövd, Tao Lin |
DM-AMS: employing data mining techniques for alert management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 2005 National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, USA, May 15-18, 2005, pp. 103-111, 2005, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
42 | Moon Sun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim, Jinoh Kim |
Applying Data Mining Techniques to Analyze Alert Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb ![In: Web Technologies and Applications, 5th Asian-Pacific Web Conference, APWeb 2003, Xian, China, April 23-25, 2002, Proceedings, pp. 193-200, 2003, Springer, 3-540-02354-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé |
M2D2: A Formal Data Model for IDS Alert Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 115-127, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
41 | So-Young Kang, Jin-Woo Song, Kwang-Jo Lee, Ju-Hee Lee, Ji-Hoon Kim, Sung-Bong Yang |
Improved Location Acquisition Algorithms for the Location-Based Alert Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 461-470, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Alert service, Acquisition Algorithm, LBS |
41 | Guofei Gu, Alvaro A. Cárdenas, Wenke Lee |
Principled reasoning and practical applications of alert fusion in intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 136-147, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IDS ensemble, alert fusion, intrusion detection, ROC curve, likelihood ratio test |
41 | Jerry Cheng, Starsky H. Y. Wong, Hao Yang 0004, Songwu Lu |
SmartSiren: virus detection and alert for smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), San Juan, Puerto Rico, June 11-13, 2007, pp. 258-271, 2007, ACM, 978-1-59593-614-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, privacy, smartphone, alert, virus detection |
41 | Chunhua Tian, Xun Zhang, Wei Ding 0002, Rongzeng Cao |
Epidemic Alert & Response Framework and Technology Based on Spreading Dynamics Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part III, pp. 1032-1039, 2007, Springer, 978-3-540-72587-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Epidemics Simulation, Epidemic Alert & Response, Critical Point Identification, Sensitivity Analysis |
41 | Anya Helene Bagge, Valentin David, Magne Haveraaen, Karl Trygve Kalleberg |
Stayin' alert: : moulding failure and exceptions to your needs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPCE ![In: Generative Programming and Component Engineering, 5th International Conference, GPCE 2006, Portland, Oregon, USA, October 22-26, 2006, Proceedings, pp. 265-274, 2006, ACM, 1-59593-237-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
alert reporting and handling, domain-specific exception language, abstraction, errors, separation of concerns, aspects, failure, partiality, guarding, mouldable programming |
41 | Joaquín García 0001, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, Guillermo Navarro 0001 |
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 223-235, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Intrusion Detection, Alert Correlation, Publish-Subscribe Systems |
41 | Bo Sun 0001, Kui Wu 0001, Udo W. Pooch |
Alert aggregation in mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003, pp. 69-78, 2003, ACM, 1-58113-769-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
alert aggregation, mobile ad hoc networks, intrusion detection, routing security |
41 | Gookwhan Ahn, Kwangjo Kim, Hee Yong Youn |
Tapping Alert Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 4-16 June 2000, Gaithersburg, MD, USA, pp. 159-164, 2000, IEEE Computer Society, 0-7695-0798-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
promiscuous mode, sniffing, tapping alert protocol, cryptography, network security |
38 | Yongmin Tan, Xiaohui Gu, Haixun Wang |
Adaptive system anomaly prediction for large-scale hosting infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, PODC 2010, Zurich, Switzerland, July 25-28, 2010, pp. 173-182, 2010, ACM, 978-1-60558-888-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
anomaly prediction, context-aware prediction model |
38 | Guang Xiang, Xiaomei Dong, Ge Yu 0001 |
Correlating Alerts with a Data Mining Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March - 1 April 2005, Hong Kong, China, pp. 341-346, 2005, IEEE Computer Society, 0-7695-2274-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Daisuke Inoue, Mio Suzuki, Masashi Eto, Katsunari Yoshioka, Koji Nakao |
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 381-382, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
darknet monitoring, live network protection, alert system |
36 | Mahboobeh Soleimani, Ali A. Ghorbani 0001 |
Critical Episode Mining in Intrusion Detection Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 5-8 May 2008, Halifax, Nova Scotia, Canada, pp. 157-164, 2008, IEEE Computer Society, 978-0-7695-3135-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Episode mining, Critical episode, Alert mining, Multistage attack, Attack scenario |
36 | Abdulhamit Subasi, M. Kemal Kiymik, Mehmet Akin, Osman Erogul |
Automatic recognition of vigilance state by using a wavelet-based artificial neural network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 14(1), pp. 45-55, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
EEG, Discrete wavelet transform (DWT), Alert, Multilayer perceptron neural network (MLPNN), Sleep, Drowsy, Levenberg-Marquardt algorithm |
36 | Peng Ning, Dingbang Xu |
Hypothesizing and reasoning about attacks missed by intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(4), pp. 591-627, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Intrusion alert correlation, missed attacks, intrusion detection |
36 | Peng Ning, Yun Cui, Douglas S. Reeves |
Constructing attack scenarios through correlation of intrusion alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 245-254, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
intrusion detection, alert correlation, attack scenarios |
32 | Jiening Wang, Qizhen Hou, Yongxin Liu, Chunfeng Zhang |
Visualizing Air Traffic Flow Management Alert Information Using Squarified Treemaps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGIV ![In: Sixth International Conference on Computer Graphics, Imaging and Visualization: New Advances and Trends, CGIV 2009, 11-14 August 2009, Tianjin, China, pp. 419-422, 2009, IEEE Computer Society, 978-0-7695-3789-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Adam J. Oliner, Alex Aiken, Jon Stearley |
Alert Detection in System Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), December 15-19, 2008, Pisa, Italy, pp. 959-964, 2008, IEEE Computer Society, 978-0-7695-3502-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Philip Fei Wu, Yan Qu, Jennifer J. Preece |
Why an emergency alert system isn't adopted: the impact of socio-technical context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCS HCI (2) ![In: Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction - Volume 2, BCS HCI 2008, Liverpool, United Kingdom, 1-5 September 2008, pp. 101-104, 2008, BCS, 978-1-906124-06-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
motivation, short message service (SMS), technology acceptance model, emergency response, socio-technical system |
32 | Reuben Smith, Nathalie Japkowicz, Maxwell G. Dondo, Peter Mason |
Using Unsupervised Learning for Network Alert Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Canadian AI ![In: Advances in Artificial Intelligence , 21st Conference of the Canadian Society for Computational Studies of Intelligence, Canadian AI 2008, Windsor, Canada, May 28-30, 2008, Proceedings, pp. 308-319, 2008, Springer, 978-3-540-68821-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Paul Jen-Hwa Hu, Tsang-Hsiang Cheng, Chih-Ping Wei, Chun-Hui Yu, A. L. F. Chan, Hue-Yu Wang |
Managing Clinical Use of High-Alert Drugs: A Supervised Learning Approach to Pharmacokinetic Data Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part A ![In: IEEE Trans. Syst. Man Cybern. Part A 37(4), pp. 481-492, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Ren-Guey Lee, Kuei-Chien Chen, Chun-Chieh Hsiao, Chwan-Lu Tseng |
A Mobile Care System With Alert Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Technol. Biomed. ![In: IEEE Trans. Inf. Technol. Biomed. 11(5), pp. 507-517, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Mandy Y. S. Tong, Dickson K. W. Chiu |
Alert Driven Process Integration and Exception Handing: A Case Study on Audit Confirmation with Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC/EEE ![In: 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (EEE 2007), 23-26 July 2007, National Center of Sciences, Tokyo, Japan, pp. 469-476, 2007, IEEE Computer Society, 0-7695-2913-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Richard M. Everson, Jonathan E. Fieldsend |
Multiobjective Optimization of Safety Related Systems: An Application to Short-Term Conflict Alert. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Evol. Comput. ![In: IEEE Trans. Evol. Comput. 10(2), pp. 187-198, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Guoqiang Shu, David Lee 0001, Mihalis Yannakakis |
A note on broadcast encryption key management with applications to large scale emergency alert systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Xiaolei Li 0001, Jiawei Han 0001, Sangkyum Kim |
Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 166-177, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Jing-Xin Wang, Zhiying Wang 0003, Kui Dai |
A PCA-LVQ Model for Intrusion Alert Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 715-716, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Reza Sadoddin, Ali A. Ghorbani 0001 |
Alert correlation survey: framework and techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 37, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Shiping Chen 0003, Dongyu Liu, Songqing Chen, Sushil Jajodia |
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 43-56, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Chao-Chun Chen, Yu-Chi Chung |
Tracking Irregularly Moving Objects based on Alert-enabling Sensor Model in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (1) ![In: 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, July 20-22, 2005, pp. 571-577, 2005, IEEE Computer Society, 0-7695-2281-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov, Alexander Ulanov |
Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 366-379, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Urs Anliker, Jamie A. Ward, Paul Lukowicz, Gerhard Tröster, François Dolveck, Michel Baer, Fatou Keita, Eran B. Schenker, Fabrizio Catarsi, Luca Coluccini, Andrea Belardinelli, Dror Shklarski, Menachem Alon, Etienne Hirt, Rolf Schmid, Milica Vuskovic |
AMON: a wearable multiparameter medical monitoring and alert system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Technol. Biomed. ![In: IEEE Trans. Inf. Technol. Biomed. 8(4), pp. 415-427, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Dong Yu 0001, Deborah A. Frincke |
A Novel Framework for Alert Correlation and Understanding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 452-466, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Dingbang Xu, Peng Ning |
Alert Correlation through Triggering Events and Common Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 360-369, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Jia-xiang Zhu, Qing-mei Tan |
Studies on a Grey Financial Alert Model of the Public Corporations Based on Degree of Grey Incidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IITSI ![In: Second International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2009, January 23-25, 2009, Moscow, Russia, pp. 87-91, 2009, IEEE Computer Society, 978-0-7695-3579-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Financial risk, Risk evaluatio, Financial alert Degree of Grey Incidence |
31 | Xi Peng 0002, Yugang Zhang, Shisong Xiao, Zheng Wu, JianQun Cui, Limiao Chen, Debao Xiao |
An Alert Correlation Method Based on Improved Cluster Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIIA (1) ![In: PACIIA 2008, Volume 1, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 19-20 December 2008, Wuhan, China, pp. 342-347, 2008, IEEE Computer Society, 978-0-7695-3490-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
QPSO, Cluster, Correlation, Alert |
31 | Gregory J. Conti, Kulsoom Abdullah, Julian B. Grizzard, John T. Stasko, John A. Copeland, Mustaque Ahamad, Henry L. Owen, Christopher P. Lee 0001 |
Countering Security Information Overload through Alert and Packet Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Computer Graphics and Applications ![In: IEEE Computer Graphics and Applications 26(2), pp. 60-70, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
alert visualization, payload visualization, packet visualization, log visualization, network visualization |
31 | Joshua W. Haines, Dorene Kewley Ryder, Laura Tinnel, Stephen Taylor |
Validation of Sensor Alert Correlators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(1), pp. 46-56, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Intrusion Alert Correlation |
28 | Chih-Ming Chen 0001, Chao-Yu Liu |
Personalized e-news monitoring agent system for tracking user-interested Chinese news events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 30(2), pp. 121-141, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
News events, News events monitoring agent system, Information retrieval, Intelligent agent |
28 | Miguel Garcia 0001, Jaime Lloret 0001 |
A Cooperative Group-Based Sensor Network for Environmental Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDVE ![In: Cooperative Design, Visualization, and Engineering, 6th International Conference, CDVE 2009, Luxembourg, Luxembourg, September 20-23, 2009. Proceedings, pp. 276-279, 2009, Springer, 978-3-642-04264-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cooperative group-based networks, environmental monitoring |
28 | Shu Chen, Yingying Chen 0001, Wade Trappe |
Exploiting environmental properties for wireless localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(1), pp. 49-51, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Navneet Kumar Pandey, S. K. Gupta 0001, Shaveta Leekha |
Algebra for Capability Based Attack Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings, pp. 117-135, 2008, Springer, 978-3-540-79965-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
capability model, intrusion detection, attack scenario |
28 | Chin-Teng Lin, Nikhil R. Pal, Chien-Yao Chuang, Tzyy-Ping Jung, Li-Wei Ko, Sheng-Fu Liang |
An EEG-based subject- and session-independent drowsiness detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2008, part of the IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, June 1-6, 2008, pp. 3448-3454, 2008, IEEE, 978-1-4244-1820-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Li Wang 0015, Zhitang Li, Jie Lei 0004 |
Learning attack strategies through mining and correlation of security alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Integrated Network Management, IM 2007. 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, 21-25 May 2007, pp. 713-716, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Evelien Korteland, Victor Bekkers |
Diffusion of E-Government Innovations in the Dutch Public Sector: The Case of Digital Community Policing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOV ![In: Electronic Government, 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 252-264, 2007, Springer, 978-3-540-74443-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
e-government innovation, diffusion, sense making, goodness of fit |
28 | Lingyu Wang 0001, Anyi Liu, Sushil Jajodia |
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 247-266, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Hervé Debar, Jouni Viinikka |
Intrusion Detection: Introduction to Intrusion Detection and Security Information Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 207-236, 2005, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Wei Yan, Edwin S. H. Hou, Nirwan Ansari |
Frame-based attack representation and real-time first order logic automatic reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITRE ![In: ITRE 2005 - 3rd International Conference on Information Technology: Research and Education, June 27-30 2005, Hsinchu, Taiwan, Proceedings, pp. 225-229, 2005, IEEE, 0-7803-8933-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Xinzhou Qin, Wenke Lee |
Attack Plan Recognition and Prediction Using Causal Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 370-379, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Noria Foukia, Salima Hassas, Serge Fenet, Paul Albuquerque |
Combining Immune Systems and Social Insect Metaphors: A Paradigm for Distributed Intrusion Detection and Response System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MATA ![In: Mobile Agents for Telecommunication Applications, 5th International Workshop, MATA 2003, Marakech, Morocco, October 8-10, 2003, Proceedings, pp. 251-264, 2003, Springer, 3-540-20298-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Regina O. Redfern, Curtis P. Langlotz, Stephanie Abbuhl, M. Polansky, Steven C. Horii, Harold L. Kundel |
The Effect of PACS on the Time Required for Technologists to Produce Radiographic Images in the Emergency Department Radiology Suite. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 15(3), pp. 153-160, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Jia Wang, Insup Lee 0001 |
Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 512-535, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1750 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|