Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
125 | Safaa Zaman, Fakhri Karray |
Lightweight IDS Based on Features Selection and IDS Classification Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 365-370, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
95 | Xin Jin, Yaoxue Zhang, Yue-Zhi Zhou, Yaya Wei |
A Novel IDS Agent Distributing Protocol for MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part II, pp. 502-509, 2005, Springer, 3-540-26043-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
87 | Sebastian Roschke, Feng Cheng 0002, Christoph Meinel |
An Extensible and Virtualization-Compatible IDS Management Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 130-134, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
84 | N. Subramanian, Pramod S. Pawar, Mayank Bhatnagar, Nihar S. Khedekar, Srinivas Guntupalli, N. Satyanarayana, V. K. Vijaykumar, Praveen D. Ampatt, Rajiv Ranjan, Prasad J. Pandit |
Development of a Comprehensive Intrusion Detection System - Challenges and Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 332-335, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Challenges in IDS, IDS Architecture, IDS Standards |
80 | Rodrigo Werlinger, Kirstie Hawkey, Kasia Muldner, Pooya Jaferian, Konstantin Beznosov |
The challenges of using an intrusion detection system: is it worth the effort? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008, pp. 107-118, 2008, ACM, 978-1-60558-276-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
collaboration, intrusion detection, usable security, security management, qualitative research, organizational factors, security tools |
80 | Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric |
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 527-546, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
79 | Mauro Silva, Denivaldo Lopes, Zair Abdelouahab |
A Remote IDS Based on Multi-Agent Systems, Web Services and MDA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEA ![In: Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28 - November 2, 2006, Papeete, Tahiti, French Polynesia, pp. 64, 2006, IEEE Computer Society, 0-7695-2703-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Software security privacy, metadata repository, agents, intrusion detection, Model-Driven Architecture |
72 | Hongjian Li, Ming Xu 0002, Yi Li |
The Research of Frame and Key Technologies for Intrusion Detection System in IEEE 802.11-based Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: Second International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2008), March 4th-7th, 2008, Technical University of Catalonia, Barcelona, Spain, pp. 455-460, 2008, IEEE Computer Society, 978-0-7695-3109-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
72 | Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric |
Measuring intrusion detection capability: an information-theoretic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 90-101, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
information-theoretic, intrusion detection, performance measurement |
71 | William H. Allen |
Mixing Wheat with the Chaff: Creating Useful Test Data for IDS Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(4), pp. 65-67, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
69 | Payas Gupta, Chedy Raïssi, Gérard Dray, Pascal Poncelet, Johan Brissaud |
SS-IDS: Statistical Signature Based IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: Fourth International Conference on Internet and Web Applications and Services, ICIW 2009, 24-28 May 2009, Venice/Mestre, Italy, pp. 407-412, 2009, IEEE Computer Society, 978-0-7695-3613-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
65 | Kenichi Kourai, Shigeru Chiba |
HyperSpector: virtual distributed monitoring environments for secure intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 1st International Conference on Virtual Execution Environments, VEE 2005, Chicago, IL, USA, June 11-12, 2005, pp. 197-207, 2005, ACM, 1-59593-047-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
inter-VM monitoring, virtual machine, virtual network, distributed IDS |
64 | Dong Yu 0001, Deborah A. Frincke |
Towards Survivable Intrusion Detection System . ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
63 | Jungsuk Song, Hiroki Takakura, Yongjin Kwon |
A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Proceedings of the 2008 International Symposium on Applications and the Internet, SAINT 2008, 28 July - 1 August 2008, Turku, Finland, pp. 55-61, 2008, IEEE Computer Society, 978-0-7695-3297-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Sufatrio, Roland H. C. Yap |
Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pp. 146-164, 2005, Springer, 3-540-31778-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Nathan Carey, Andrew J. Clark, George M. Mohay |
IDS Interoperability and Correlation Using IDMEF and Commodity Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 252-264, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Interoperability, Intrusion Detection, Network Management, Correlation, Data Analysis |
63 | Hee Suk Seo, Tae Ho Cho |
Simulation of Network Security with Collaboration among IDS Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Joint Conference on Artificial Intelligence ![In: AI 2001: Advances in Artificial Intelligence, 14th Australian Joint Conference on Artificial Intelligence, Adelaide, Australia, December 10-14, 2001, Proceedings, pp. 438-448, 2001, Springer, 3-540-42960-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
56 | Liwei Kuang, Mohammad Zulkernine |
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 319-326, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection systems, Intrusion-tolerance |
56 | Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt |
Formal Reasoning About Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 278-295, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
verification, formal method, Intrusion detection, security policy |
56 | Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam |
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 15-19 April 2002, Fort Lauderdale, FL, USA, CD-ROM/Abstracts Proceedings, 2002, IEEE Computer Society, 0-7695-1573-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
attack resistant, mobile agents, intrusion detection systems, DoS attacks |
56 | Jia Wang, Insup Lee 0001 |
Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 512-535, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
56 | Guangchun Luo, Xianliang Lu, Jiong Li, Jun Zhang |
MADIDS: a novel distributed IDS based on mobile agent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 37(1), pp. 46-53, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
performance, mobile agent, distributed IDS |
55 | Xiantao Zhang, Qi Li 0002, Sihan Qing, Huanguo Zhang |
VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008, pp. 594-600, 2008, IEEE Computer Society, 0-7695-3090-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Vidar Evenrud Seeberg, Slobodan Petrovic |
A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 385-390, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Alia Fourati, Khaldoun Al Agha |
Detecting forged routing messages in ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 39(3-4), pp. 205-214, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
OLSR protocol, Routing vulnerabilities, MANET, IDS, Security services |
50 | Hoda M. Hassan, Mohy Mahmoud, Sherif El-Kassas |
Securing the AODV protocol using specification-based intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'06 - Proceedings of the Second ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Terromolinos, Spain, October 2, 2006, pp. 33-36, 2006, ACM, 1-59593-486-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
specification-based detection, IDS, network monitoring, AODV |
49 | Julio Gómez, Consolación Gil, Nicolás Padilla, Raul Baños, C. Jiménez |
Design of a Snort-Based Hybrid Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWANN (2) ![In: Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living, 10th International Work-Conference on Artificial Neural Networks, IWANN 2009 Workshops, Salamanca, Spain, June 10-12, 2009. Proceedings, Part II, pp. 515-522, 2009, Springer, 978-3-642-02480-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, Intrusion detection systems, Snort, Network IDS |
48 | Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng |
Effect of Intrusion Detection on Failure Time of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 14th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2008, 15-17 December 2008, Taipei, Taiwan, pp. 289-296, 2008, IEEE Computer Society, 978-0-7695-3448-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasant G. Honavar, Les Miller, Robyn R. Lutz |
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Requir. Eng. ![In: Requir. Eng. 7(4), pp. 207-220, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Software fault tree, Mobile agents, Intrusion detection system, Requirements analysis, Coloured Petri nets |
48 | Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang |
Performance Adaptation in Real-Time Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 252-273, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Real-time intrusion detection, performance adaptation, optimization, performance metrics |
48 | Steve Jones, Stephen Lundy, Gordon W. Paynter |
Interactive Document Summarisation Using Automatically Extracted Keyphrases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 101, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Danny Dhillon, Jerry Zhu, John Richards, Tejinder S. Randhawa |
Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 45-50, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multipoint relay (MPR), optimized link state routing (OLSR), routing protocol integrity, security, mobile ad-hoc networks (MANET), IP, intrusion detection systems (IDS) |
47 | Han Qiu 0001, Luna Li, Linghe Kong |
Message from the Program Chairs IDS 2022. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BigDataSecurity/HPSC/IDS ![In: 8th IEEE Intl Conference on Big Data Security on Cloud, IEEE Intl Conference on High Performance and Smart Computing and IEEE Intl Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS, Jinan, China, May 6-8, 2022, pp. 1, 2022, IEEE, 978-1-6654-8069-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
47 | Masayuki Murakami, Nakaji Honda |
Experimental Investigation of the Fault Tolerance of IDS Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FUZZ-IEEE ![In: FUZZ-IEEE 2007, IEEE International Conference on Fuzzy Systems, Imperial College, London, UK, 23-26 July, 2007, Proceedings, pp. 1-7, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Mehdi Salour, Xiao Su |
Dynamic Two-Layer Signature-Based IDS with Unequal Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 77-82, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | A. Karygiannis, K. Robotis, E. Antonakakis |
Creating Offline MANET IDS Network Traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2007 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2007), 18-21 June 2007, Helsinki, Finland, Proceedings, pp. 1-6, 2007, IEEE Computer Society, 1-4244-0992-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Marko Jahnke, Jens Tölle, Alexander Finkenbrink, Alexander Wenzel, Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini |
Methodologies and frameworks for testing ids in adhoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'07 - Proceedings of the Third ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, October 22, 2007, pp. 113-122, 2007, ACM, 978-1-59593-806-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
attacks and attack implementations, hardware testbed, reproducible node motion, semi-virtual testbed, smart MANET jamming, worm hole, black hole |
47 | Masayuki Murakami, Nakaji Honda |
Fault Tolerance Comparison of IDS Models with Multilayer Perceptron and Radial Basis Function Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2007, Celebrating 20 years of neural networks, Orlando, Florida, USA, August 12-17, 2007, pp. 1079-1084, 2007, IEEE, 978-1-4244-1379-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Abhishek Mitra, Walid A. Najjar, Laxmi N. Bhuyan |
Compiling PCRE to FPGA for accelerating SNORT IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: Proceedings of the 2007 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, ANCS 2007, Orlando, Florida, USA, December 3-4, 2007, pp. 127-136, 2007, ACM, 978-1-59593-945-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
deep payload inspection, nondeterministic nite automata, intrusion detection system, regular expressions |
47 | Emilio Corchado, Álvaro Herrero 0001, José Manuel Sáiz |
Testing CAB-IDS Through Mutations: On the Identification of Network Scans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part II, pp. 433-441, 2006, Springer, 3-540-46537-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Nigel Jacob, Carla E. Brodley |
Offloading IDS Computation to the GPU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 371-380, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Lingjuan Li, Wenyu Tang, Ruchuan Wang 0001 |
A CBR Engine Adapting to IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 334-339, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Ilija Basicevic, Miroslav Popovic, Vladimir Kovacevic |
The Use of Distributed Network-Based IDS Systems in Detection of Evasion Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICT/SAPIR/ELETE ![In: Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 17-22 July 2005, Lisbon, Portugal, pp. 78-82, 2005, IEEE Computer Society, 0-7695-2388-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Nathan Carey, George M. Mohay, Andrew J. Clark |
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 245-254, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Ricki G. Ingalls, John W. Nazemetz |
Supply chain applications I: designing the support logistics for the FAA ACE-IDS system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 33nd conference on Winter simulation, WSC 2001, Arlington, VA, USA, December 9-12, 2001, pp. 1117-1122, 2001, WSC, 0-7803-7309-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Kulsoom Abdullah, Christopher P. Lee 0001, Gregory J. Conti, John A. Copeland, John T. Stasko |
IDS RainStorm: Visualizing IDS Alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 1, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
IDS alarms, alert visualization, log visualization, alarm visualization, network security information visualization, network monitoring |
42 | Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt |
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings, pp. 249-271, 2006, Springer, 3-540-39723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DEMEM, TBRPF, attack method, MPR selector, Hello message, TC message, ID message, ID Manager, ID-Evidence, ID-Forward, ID-Request, MANET, constraint, IDS, AODV, evidence, DSR, OLSR, forwarder, TESLA, MPR |
42 | María Bermúdez-Edo, Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro |
Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers, pp. 210-221, 2006, Springer, 3-540-69083-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Intrusion event, Network security, Assessment, IDS |
41 | Patrick S. Wheeler, Errin W. Fulp |
A taxonomy of parallel techniques for intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007, pp. 278-282, 2007, ACM, 978-1-59593-629-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, intrusion detection systems (IDS) |
41 | Hyun-A Park, Dong Hoon Lee 0001, Jongin Lim 0001, Sang Hyun Cho |
PPIDS: Privacy Preserving Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 269-274, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Host-based IDS, Privacy, Intrusion Detection System, Audit log, Privacy Homomorphism |
41 | John McHugh |
The 1998 Lincoln Laboratory IDS Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings, pp. 145-161, 2000, Springer, 3-540-41085-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Evaluation, IDS, ROC Analysis |
40 | Sven Ehlert, Ge Zhang, Thomas Magedanz |
Increasing SIP firewall performance by ruleset size limitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, 15-18 September 2008, Cannes, French Riviera, France, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Hui Liu, Zhitang Li |
Methodology of Network Intrusion Detection System Penetration Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: The Ninth International Conference on Web-Age Information Management, WAIM 2008, July 20-22, 2008, Zhangjiajie, China, pp. 546-551, 2008, IEEE Computer Society, 978-0-7695-3185-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Babak Khosravifar, Jamal Bentahar |
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 997-1004, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Luciano Bononi, Carlo Tacconi |
Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(6), pp. 379-392, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Secure clustering and routing, Statistically unique and cryptographically verifiable identifiers, Mobile Ad Hoc and Vehicular Networks, Intrusion detection system |
40 | Kuo Zhao, Meng Zhang 0006, Kexin Yang, Liang Hu 0001 |
Data Collection for Intrusion Detection System Based on Stratified Random Sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2007, London, UK, 15-17 April 2007, pp. 852-855, 2007, IEEE, 1-4244-1076-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Luciano Bononi, Carlo Tacconi |
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 398-414, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Secure Clustering and Routing, Statistically Unique and Cryptographically Verifiable Identifiers, Mobile Ad Hoc Networks, Intrusion Detection System |
40 | Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke |
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 590-595, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Frédéric Massicotte, François Gagnon, Yvan Labiche, Lionel C. Briand, Mathieu Couture |
Automatic Evaluation of Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 361-370, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Ioannis Sourdis, Vassilis Dimopoulos, Dionisios N. Pnevmatikatos, Stamatis Vassiliadis |
Packet pre-filtering for network intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, ANCS 2006, San Jose, California, USA, December 3-5, 2006, pp. 183-192, 2006, ACM, 1-59593-580-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
packet inspection, packet pre-filtering, intrusion detection |
40 | Oge Marques, Pierre Baillargeon |
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 496-501, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Se-Yul Lee, Yong-Soo Kim, Bong-Hwan Lee, Sukhoon Kang, Chan-Hyun Youn |
A Probe Detection Model Using the Analysis of the Fuzzy Cognitive Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I, pp. 320-328, 2005, Springer, 3-540-25860-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Yong Zeng 0002, Jianfeng Ma 0001 |
Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 228-235, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Matthew V. Mahoney 0001, Philip K. Chan |
Learning nonstationary models of normal network traffic for detecting novel attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, July 23-26, 2002, Edmonton, Alberta, Canada, pp. 376-385, 2002, ACM, 1-58113-567-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Ids Van der Werf, Henry Dol, Koen Blom, Richard Heusdens, Richard C. Hendriks, Geert Leus |
On the equivalence of OSDM and OTFS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Process. ![In: Signal Process. 214, pp. 109254, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
40 | Ids Van der Werf, Richard Heusdens, Richard C. Hendriks, Geert Leus |
Optimal Pilot Design for OTFS in Linear Time-Varying Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.19379, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
40 | Ids Van der Werf, Richard C. Hendriks, Richard Heusdens, Geert Leus |
Transmit Waveform Design Based on the Cramér-Rao Lower Bound. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAMSAP ![In: 9th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, CAMSAP 2023, Herradura, Costa Rica, December 10-13, 2023, pp. 166-170, 2023, IEEE, 979-8-3503-4452-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
40 | Ids Van der Werf, Richard C. Hendriks, Richard Heusdens |
Channel Parameter Estimation Using a Wideband LFM Preamble: Comparison of the Fractional Fourier Transform and Matched Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSIPCO ![In: 31st European Signal Processing Conference, EUSIPCO 2023, Helsinki, Finland, September 4-8, 2023, pp. 1430-1434, 2023, IEEE, 978-9-4645-9360-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
40 | Ids Van der Werf, Pablo Martínez-Nuevo, Martin Bo Møller, Richard C. Hendriks, Jorge Martínez 0002 |
Towards Gridless Sound Field Reconstruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSIPCO ![In: 30th European Signal Processing Conference, EUSIPCO 2022, Belgrade, Serbia, August 29 - Sept. 2, 2022, pp. 862-866, 2022, IEEE, 978-90-827970-9-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
40 | Lennart Blanken, Ids van den Meijdenberg, Tom Oomen |
Kernel-based regression of non-causal systems for inverse model feedforward estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMC ![In: IEEE 15th International Workshop on Advanced Motion Control, AMC 2018, Tokyo, Japan, March 9-11, 2018, pp. 461-466, 2018, IEEE, 978-1-5386-1946-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
40 | Emmy Rood, Robert-Jan Bosman, Johan Ids van der Spoel, Paul Taylor, Durk Freark Zandstra |
Research Paper: Use of a Computerized Guideline for Glucose Regulation in the Intensive Care Unit Improved Both Guideline Adherence and Glucose Regulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Am. Medical Informatics Assoc. ![In: J. Am. Medical Informatics Assoc. 12(2), pp. 172-180, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Paul T. M. van Zeijl, Jan-Wim Th. Eikenbroek, Peter Paul Vervoort, Suma Setty, Jurjen Tangenberg, Gary Shipton, Eric Kooistra, Ids C. Keekstra, Didier Belot, Klaas Visser, Erwin Bosma, Stephan C. Blaakmeer |
A 1.1-V 270-μA mixed-signal hearing aid chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Solid State Circuits ![In: IEEE J. Solid State Circuits 37(12), pp. 1670-1678, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Paul T. M. van Zeijl, Jan-Wim Th. Eikenbroek, Peter Paul Vervoort, Suma Setty, Jurjen Tangenberg, Gary Shipton, Eric Kooistra, Ids C. Keekstra, Didier Belot, Klaas Visser, Erwin Bosma, Stephan C. Blaakmeer |
A Bluetooth radio in 0.18-μm CMOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Solid State Circuits ![In: IEEE J. Solid State Circuits 37(12), pp. 1679-1687, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Jouni Viinikka, Hervé Debar |
Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 166-187, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
IDS background noise, alert volume reduction, EWMA |
39 | Steven Noel, Sushil Jajodia |
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 16(3), pp. 259-275, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Topological vulnerability analysis, Intrusion detection, Attack graphs, Sensor placement |
39 | Masayuki Murakami, Nakaji Honda |
Performance of the IDS Method as a Soft Computing Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Fuzzy Syst. ![In: IEEE Trans. Fuzzy Syst. 16(6), pp. 1582-1596, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Ashok Kumar Tummala, Parimal Patel |
Distributed IDS using Reconfigurable Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), Proceedings, 26-30 March 2007, Long Beach, California, USA, pp. 1-6, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Álvaro Herrero 0001, Emilio Corchado, José Manuel Sáiz |
MOVICAB-IDS: Visual Analysis of Network Traffic Data Streams for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2006, 7th International Conference, Burgos, Spain, September 20-23, 2006, Proceedings, pp. 1424-1433, 2006, Springer, 3-540-45485-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Exploratory Projection Pursuit, Neural Networks, Intrusion Detection, Multiagent Systems, Unsupervised Learning, Computer Network Security |
39 | Emmanuel Hooper |
An Intelligent Detection and Response Strategy to False Positives and Network Attacks: Operation of Network Quarantine Channels and Feedback Methods to IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 16-21, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Emanoel Costa Claudino, Zair Abdelouahab, Mário Meireles Teixeira |
Management and Integration of Information in Intrusion Detection System: Data Integration System for IDS Based Multi-Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT Workshops ![In: Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology - Workshops, Hong Kong, China, 18-22 December 2006, pp. 49-52, 2006, IEEE Computer Society, 0-7695-2749-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Ricardo Staciarini Puttini, Jean-Marc Percher, Ludovic Mé, Rafael T. de Sousa Jr. |
A fully distributed IDS for MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 331-338, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | A. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff |
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 217-228, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
personal IDS, smart card, Intrusion Detection System, IDS, behavioural analysis |
34 | Rituparna Chaki, Nabendu Chaki |
IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIM ![In: 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2007, Elk, Poland, June 28-30, 2007, pp. 179-184, 2007, IEEE Computer Society, 0-7695-2894-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Compromise node, Internal intrusion, Phantom intrusion detection, Mobile ad hoc network, IDS |
34 | A. Karygiannis, E. Antonakakis, A. Apostolopoulos |
Detecting Critical Nodes for MANET Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 7-15, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
edge-cut, vertex-cut, security, mobile ad hoc network, MANET, intrusion detection, IDS |
34 | Jessie B. Kennedy, Peter J. Barclay (eds.) |
Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![Springer, 3-540-76066-0 The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | Marc Gemis |
The Use of the Data Dictionary in DBMS Based on Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 7, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | Mohamed Dbouk, Donatas Kvedarauskas, Patrice Boursier |
Dynamic Maps: An Intuitive Interface for Naive Users of Geographical Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 7, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | Thomas Schweikert, Matthias L. Hemmje |
A Graphical User Interface to the Object-Oriented Database System VODAK on the Basis of the Generic Visualisation Toolkit Lyberworld. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 2, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | Kenneth J. Mitchell, Jessie B. Kennedy |
DRIVE - An Environment for the Organised Construction of User-Interfaces to Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 3, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | Ee-Peng Lim, Soo-Yin Cheng |
LibSearch: A Window-Based Frontend to Remote Bibliographic Databases on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 5, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | Norman W. Paton, Khoa Doan, Oscar Díaz, Arturo Jaime 0001 |
Exploitation of Object-Oriented and Active Constructs in Database Interface Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 1, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | Laura Tarantino |
Hypertabular Representation of Database Relations in World Wide Web Front-Ends. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 6, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | Francesca Benzi, Dario Maio, Stefano Rizzi |
Visionary: A Visual Query Language Based on the User Viewpoint Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 4, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | Shi-Kuo Chang, Maria Francesca Costabile, M. Vairo |
VR Queries and Their Transformations in a Progressive Querying Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 5, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | Alison Crerar, Peter J. Barclay, Richard Watt |
TOTEM: An Interactive Tool for Creative Data Modelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 6, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | Armstrong Kadyamatimba, John A. Mariani, Peter Sawyer |
Desktop Objects: Directly Manipulating Data and Meta Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 2, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | J. Boyle, H. Horch, M. Scharf |
Visualising Large Data Sets in Molecular Biology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 8, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | Matthew Chalmers |
Interface Design: More Craft than Science? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 1, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | Marie-Aude Aufaure-Portier, Claude Trépied |
A Survey of Query Languages for Geographic Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 3, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
34 | Albert N. Badre, Tiziana Catarci, Antonio Massari, Giuseppe Santucci |
Comparative Ease of Use of a Diagrammatic vs. an Iconic Query Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996., pp. 4, 1996, Springer, 3-540-76066-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|