The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for HIDS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2017 (15) 2018-2023 (11)
Publication types (Num. hits)
article(9) inproceedings(17)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 37 occurrences of 30 keywords

Results
Found 26 publication records. Showing 26 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
115Kai Hwang 0001, Min Cai, Ying Chen, Min Qin Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SNORT and Bro systems, Internet episodes, traffic data mining, Network security, anomaly detection, intrusion detection systems, false alarms, signature generation
78Xiaoyu Wang, Hongyan Liu, Daoxin Er HIDS: a multifunctional generator of hierarchical data streams. Search on Bibsonomy Data Base The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data mining, data stream, data generator, computing technique
69Diogo Ferreira Pacheco, Flávio R. S. Oliveira, Fernando Buarque de Lima Neto Including multi-objective abilities in the Hybrid Intelligent Suite for decision support. Search on Bibsonomy IJCNN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Dhiman Barman, Jaideep Chandrashekar, Nina Taft, Michalis Faloutsos, Ling Huang, Frédéric Giroire Impact of IT monoculture on behavioral end host intrusion detection. Search on Bibsonomy WREN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF host intrusion detection, measurement, anomaly detection, user profile, enterprise management
46Anh-Quynh Nguyen, Yoshiyasu Takefuji A novel approach for a file-system integrity monitor tool of Xen virtual machine. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Xen virtual machine, intrusion detection, Linux, rootkit
46Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Yogendra Kumar, Basant Subba Stacking ensemble-based HIDS framework for detecting anomalous system processes in Windows based operating systems using multiple word embedding. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
32Max Landauer, Maximilian Frank, Florian Skopik, Wolfgang Hotwagner, Markus Wurzenberger, Andreas Rauber A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation. Search on Bibsonomy SAT-CPS@CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
32Seoung-Pyo Hong, Chae-Ho Lim, Hoon-Jae Lee 0001 APT attack response system through AM-HIDS. Search on Bibsonomy ICACT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
32Seoung-Pyo Hong, Chae-Ho Lim, Hoon-Jae Lee 0001 APT attack response system through AM-HIDS. Search on Bibsonomy ICACT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Jiwon Seo, Inyoung Bang, Junseung You, Yeongpil Cho, Yunheung Paek SBGen: A Framework to Efficiently Supply Runtime Information for a Learning-Based HIDS for Multiple Virtual Machines. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
32Elham Besharati, Marjan Naderan, Ehsan Namjoo LR-HIDS: logistic regression host-based intrusion detection system for cloud environments. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32Ahmed I. Saleh, Fatma M. Talaat, Labib M. Labib A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers. Search on Bibsonomy Artif. Intell. Rev. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32Guilherme de O. Kfouri, Daniel G. V. Gonçalves, Bruno V. Dutra, João F. de Alencastro, Francisco L. de Caldas Filho, Lucas M. C. e Martins, Bruno J. G. Praciano, Robson de Oliveira Albuquerque, Rafael T. de Sousa Jr. Design of a Distributed HIDS for IoT Backbone Components. Search on Bibsonomy FedCSIS (Communication Papers) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32Dainius Ceponis, Nikolaj Goranin Towards a Robust Method of Dataset Generation of Malicious Activity for Anomaly-Based HIDS Training and Presentation of AWSCTD Dataset. Search on Bibsonomy Balt. J. Mod. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
32Prachi Deshpande, Subhash Chander Sharma, Sateesh Kumar Peddoju, S. Junaid HIDS: A host based intrusion detection system for cloud computing environment. Search on Bibsonomy Int. J. Syst. Assur. Eng. Manag. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
32Dainius Ceponis, Nikolaj Goranin Towards a Robust Method of Dataset Generation of Malicious Activity on a Windows-Based Operating System for Anomaly-Based HIDS Training. Search on Bibsonomy Doctoral Consortium/Forum@DB&IS The full citation details ... 2018 DBLP  BibTeX  RDF
32Zhijian Wang, Yanqin Zhu A centralized HIDS framework for private cloud. Search on Bibsonomy SNPD The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
32Poly Sen, Nabendu Chaki, Rituparna Chaki HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks. Search on Bibsonomy CISIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Jacob Zimmermann, Ludovic Mé, Christophe Bidan Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Ying Lin, Yan Zhang, Yang-jia Ou The Design and Implementation of Host-Based Intrusion Detection System. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF OSSEC, intrusion detection, intrusion detection system, BP neural network, Log analysis, HIDS
31Dima Stopel, Robert Moskovitch, Zvi Boger, Yuval Shahar, Yuval Elovici Using artificial neural networks to detect unknown computer worms. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Feature selection, Artificial neural networks, Worm detection, HIDS
31David J. Malan, Michael D. Smith 0001 Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF collaborative detection, native API, win32, IDS, worms, windows, system calls, temporal consistency, peers, system services, host-based intrusion detection, HIDS
23Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Anh-Quynh Nguyen, Yoshiyasu Takefuji A Real-time Integrity Monitor for Xen Virtual Machine. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Hans-Christoph Steiner [hid] toolkit: a unified framework for instrument design. Search on Bibsonomy ACM Multimedia The full citation details ... 2005 DBLP  DOI  BibTeX  RDF instrument design, haptic feedback, gestural control, HID
Displaying result #1 - #26 of 26 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license