|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 567 occurrences of 393 keywords
|
|
|
Results
Found 1119 publication records. Showing 1119 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
151 | Lingyu Wang 0001, Anyi Liu, Sushil Jajodia |
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 247-266, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
112 | Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu |
Techniques and tools for analyzing intrusion alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(2), pp. 274-318, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Intrusion detection, security management, alert correlation |
93 | Peng Ning, Yun Cui, Douglas S. Reeves |
Constructing attack scenarios through correlation of intrusion alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 245-254, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
intrusion detection, alert correlation, attack scenarios |
93 | Peng Ning, Yun Cui, Douglas S. Reeves |
Analyzing Intensive Intrusion Alerts via Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 74-94, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Attack Scenario Analysis, Intrusion Detection, Alert Correlation |
87 | Alexander Hofmann, Ivan Dedinski, Bernhard Sick, Hermann de Meer |
A Novelty-Driven Approach to Intrusion Alert Correlation Based on Distributed Hash Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, pp. 71-78, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
83 | Guofei Jiang, Haifeng Chen, Kenji Yoshihira, Akhilesh Saxena |
Ranking the importance of alerts for problem determination in large computer systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAC ![In: Proceedings of the 6th International Conference on Autonomic Computing, ICAC 2009, June 15-19, 2009, Barcelona, Spain, pp. 3-12, 2009, ACM, 978-1-60558-564-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
alert ranking, invariant network, fault model, peer review, fault management, rule management |
83 | Shahrulniza Musa, David J. Parish |
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings, pp. 169-180, 2008, Springer, 978-3-540-85931-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
alert visualization, network security information visualization, alert classification, machine learning |
77 | Moon Sun Shin, Kyeong Ja Jeong |
An Alert Data Mining Framework for Network-Based Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 38-53, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Dong Li, Zhitang Li, Jie Ma |
Processing Intrusion Detection Alerts in Large-scale Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 545-548, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection, large-scale network |
74 | Mahboobeh Soleimani, Ali A. Ghorbani 0001 |
Critical Episode Mining in Intrusion Detection Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 5-8 May 2008, Halifax, Nova Scotia, Canada, pp. 157-164, 2008, IEEE Computer Society, 978-0-7695-3135-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Episode mining, Critical episode, Alert mining, Multistage attack, Attack scenario |
74 | Jingmin Zhou, Mark R. Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop |
Modeling network intrusion detection alerts for correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(1), pp. 4, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
alert fusion, intrusion detection, capability, Alert correlation |
74 | Mark Sherriff, Sarah Smith Heckman, J. Michael Lake, Laurie A. Williams |
Using groupings of static analysis alerts to identify files likely to contain field failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007, Dubrovnik, Croatia, September 3-7, 2007, pp. 565-568, 2007, ACM, 978-1-59593-811-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
field failures, static analysis, singular value decomposition |
74 | Sarah Smith Heckman |
Adaptive Probabilistic Model for Ranking Code-Based Static Analysis Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE Companion ![In: 29th International Conference on Software Engineering (ICSE 2007), Minneapolis, MN, USA, May 20-26, 2007, Companion Volume, pp. 89-90, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
74 | Liang-Min Wang 0001, Jian-Feng Ma 0001, Yong-Zhao Zhan |
Enhancing the Content of the Intrusion Alerts Using Logic Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWCC ![In: Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings, pp. 137-142, 2004, Springer, 3-540-23898-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
67 | Mahmoud Jazzar, Aman Bin Jantan |
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM-Based Intrusion Detection Sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: Second Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, Malaysia, May 13-15, 2008, pp. 1054-1060, 2008, IEEE Computer Society, 978-0-7695-3136-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
False alerts, Security, Intrusion detection, Self organizing maps, Fuzzy cognitive maps |
64 | Safaa O. Al-Mamory, Hongli Zhang 0001 |
IDS alerts correlation using grammar-based approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 5(4), pp. 271-282, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
64 | Pravesh Gaonjur, N. Z. Tarapore, S. G. Pukale, M. L. Dhore |
Using Neuro-Fuzzy Techniques to reduce false alerts in IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Dickson K. W. Chiu, Benny W. C. Kwok, Ray L. S. Wong, Shing-Chi Cheung, Eleanna Kafeza, Marina Kafeza |
Alerts for Healthcare Process and Data Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
58 | Vandana Pursnani Janeja, Vijayalakshmi Atluri, Ahmed Gomaa, Nabil R. Adam, Christof Bornhövd, Tao Lin |
DM-AMS: employing data mining techniques for alert management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 2005 National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, USA, May 15-18, 2005, pp. 103-111, 2005, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
58 | Dingbang Xu, Peng Ning |
Alert Correlation through Triggering Events and Common Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 360-369, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
58 | Frédéric Cuppens, Alexandre Miège |
Alert Correlation in a Cooperative Intrusion Detection Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002, pp. 202-215, 2002, IEEE Computer Society, 0-7695-1543-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Cooperative Intrusion Detection, IDMEF, Alert Merging, Alert Correlation |
58 | Hamed Ketabdar, Tim Polzehl |
Tactile and visual alerts for deaf people by mobile phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASSETS ![In: Proceedings of the 11th International ACM SIGACCESS Conference on Computers and Accessibility, ASSETS 2009, Pittsburgh, Pennsylvania, USA, October 25-28, 2009, pp. 253-254, 2009, ACM, 978-1-60558-558-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
audio events, change of audio pattern, deaf or hard of hearing people, vibro-tactile and visual alerts, mobile phones |
58 | José A. Borges, Néstor J. Rodríguez, Carlos Pérez, Gilberto Crespo |
Usability Issues in the Development of a User Interface for an Alerts and Reminders System for a Nursing Documentation Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (4) ![In: Human-Computer Interaction. HCI Applications and Services, 12th International Conference, HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part IV, pp. 418-426, 2007, Springer, 978-3-540-73109-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
electronic medical record systems, alerts and reminders systems, graphical user interfaces, usability testing, usability engineering |
58 | Sandy Dance, Malcolm Gorman, Lin Padgham, Michael Winikoff |
An evolving multi agent system for meteorological alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The Second International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2003, July 14-18, 2003, Melbourne, Victoria, Australia, Proceedings, pp. 966-967, 2003, ACM, 1-58113-683-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
XML, agents, BDI, alerts, meteorology |
54 | Guang Xiang, Xiaomei Dong, Ge Yu 0001 |
Correlating Alerts with a Data Mining Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March - 1 April 2005, Hong Kong, China, pp. 341-346, 2005, IEEE Computer Society, 0-7695-2274-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Khalid Alsubhi, Ehab Al-Shaer, Raouf Boutaba |
Alert prioritization in Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 33-40, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Bing Yang, Huaping Hu, Xiangwen Duan, Shiyao Jin |
An Intelligent Network-Warning Model with Strong Survivability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 133-145, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Strong Survivability, Network-Warning, Intelligence, Equality |
48 | Michael Treaster, William Conner, Indranil Gupta, Klara Nahrstedt |
ContagAlert: Using Contagion Theory for Adaptive, Distributed Alert Propagation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Fifth IEEE International Symposium on Network Computing and Applications, NCA 2006, 24-26 July 2006, Cambridge, Massachusetts, USA, pp. 126-136, 2006, IEEE Computer Society, 0-7695-2640-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Emmanuel Hooper |
An Intelligent Detection and Response Strategy to False Positives and Network Attacks: Operation of Network Quarantine Channels and Feedback Methods to IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 16-21, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | John D. Lee, Joshua D. Hoffman, Elizabeth Hayes |
Collision warning design to mitigate driver distraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2004 Conference on Human Factors in Computing Systems, CHI 2004, Vienna, Austria, April 24 - 29, 2004, pp. 65-72, 2004, ACM, 1-58113-702-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
collision warning systems, smart cars, trust, notification systems, user acceptance, distraction |
48 | Tadeusz Pietraszek |
Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 102-124, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Seong Ho Lee, HyungHyo Lee, BongNam Noh |
A Rule-Based Intrusion Alert Correlation System for Integrated Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part I, pp. 365-372, 2004, Springer, 3-540-22114-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Jungsuk Song, Hiroki Takakura, Yongjin Kwon |
A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Proceedings of the 2008 International Symposium on Applications and the Internet, SAINT 2008, 28 July - 1 August 2008, Turku, Finland, pp. 55-61, 2008, IEEE Computer Society, 978-0-7695-3297-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Riyad Alshammari, Sumalee Sonamthiang, Mohsen Teimouri, Denis Riordan |
Using Neuro-Fuzzy Approach to Reduce False Positive Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 14-17 May 2006, Fredericton, New Brunswick, Canada, pp. 345-349, 2007, IEEE Computer Society, 0-7695-2835-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Classification, Intrusion Detection, False Positive, Neuro- Fuzzy |
45 | Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira, Yongjin Kwon |
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings, pp. 247-253, 2007, Springer, 978-3-540-76927-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Mark Sherriff, Sarah Smith Heckman, Mike Lake, Laurie A. Williams |
Identifying fault-prone files using static analysis alerts through singular value decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 2007 conference of the Centre for Advanced Studies on Collaborative Research, October 22-25, 2007, Richmond Hill, Ontario, Canada, pp. 276-279, 2007, IBM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Lorna M. Brown, Topi Kaaresoja |
Feel who's talking: using tactons for mobile phone alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montréal, Québec, Canada, April 22-27, 2006, pp. 604-609, 2006, ACM, 978-1-59593-298-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
mobile computing, mobile phones, tactile displays, non-visual interaction, tactile icons |
45 | Frédéric Cuppens |
Managing Alerts in a Multi-Intrusion Detection Environmen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 22-31, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
IDMEF, cooperative intrusion detection, alert clustering, alert merging, IDS, DTD |
42 | Manuel Costa, Jon Crowcroft, Miguel Castro 0001, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham 0001 |
Vigilante: End-to-end containment of Internet worm epidemics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 26(4), pp. 9:1-9:68, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
self-certifying alerts, vulnerability condition slicing, program analysis, dynamic data-flow analysis, Worm containment |
42 | Ouri Wolfson, Soumitra Sengupta, Yechiam Yemini |
Managing Communication Networks by Monitoring Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 17(9), pp. 944-953, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
database monitoring, large communication networks, network management functions, data-manipulation operations, change-tracking, data communication systems, computer networks, database management systems, query languages, statistical tests, alerts, telecommunication network management, data-manipulation languages, network management systems |
39 | Maheyzah Md Siraj, Mohd Aizaini Maarof, Siti Zaiton Mohd Hashim |
Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 679-682, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Reuben Smith, Nathalie Japkowicz, Maxwell G. Dondo, Peter Mason |
Using Unsupervised Learning for Network Alert Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Canadian AI ![In: Advances in Artificial Intelligence , 21st Conference of the Canadian Society for Computational Studies of Intelligence, Canadian AI 2008, Windsor, Canada, May 28-30, 2008, Proceedings, pp. 308-319, 2008, Springer, 978-3-540-68821-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Magnus Almgren, Ulf Lindqvist, Erland Jonsson |
A Multi-Sensor Model to Improve Automated Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 291-310, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
alert reasoning, intrusion detection |
39 | Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis |
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 367-376, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Mahboobeh Soleimani, Ehsan Khosrowshahi Asl, Mina Doroud, Morteza Damanafshan, Akbar Behzadi, Maghsoud Abbaspour |
RAAS: a reliable analyzer and archiver for snort intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 259-263, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
IDS analyzer, intrusion detection system, archiving, snort |
39 | Shahrulniza Musa, David J. Parish |
Visualising Communication Network Security Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: 11th International Conference on Information Visualisation, IV 2007, 2-6 July 2007, Zürich, Switzerland, pp. 726-733, 2007, IEEE Computer Society, 0-7695-2907-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | James Aspnes, Navin Rustagi, Jared Saia |
Worm Versus Alert: Who Wins in a Battle for Control of a Large-Scale Network?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 11th International Conference, OPODIS 2007, Guadeloupe, French West Indies, December 17-20, 2007. Proceedings, pp. 443-456, 2007, Springer, 978-3-540-77095-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Self-certifying alert, epidemic processes, peer-to-peer, overlay network, worm, expander graphs |
39 | Najwa A. Bakar, Bahari Belaton |
Towards Implementing Intrusion Alert Quality Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFMA ![In: 1st International Conference on Distributed Frameworks for Multimedia Applications (DFMA 2005), 6-9 February 2005, Besançon, France, pp. 198-205, 2005, IEEE Computer Society, 0-7695-2273-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Dickson K. W. Chiu, Samuel P. M. Choi |
Alert Driven Communications Management for Distance Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March - 1 April 2005, Hong Kong, China, pp. 570-575, 2005, IEEE Computer Society, 0-7695-2274-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Jungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choonsik Park, Dong-Kyoo Kim |
An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Convergence in Broadband and Mobile Networking, International Conference, ICOIN 2005, Jeju Island, Korea, January 31- February 2, 2005, Proceedings, pp. 72-79, 2005, Springer, 3-540-24467-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Junfeng Tian, Weidong Zhao, Ruizhong Du |
D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 244-251, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Wei Yan, Edwin S. H. Hou, Nirwan Ansari |
Frame-based attack representation and real-time first order logic automatic reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITRE ![In: ITRE 2005 - 3rd International Conference on Information Technology: Research and Education, June 27-30 2005, Hsinchu, Taiwan, Proceedings, pp. 225-229, 2005, IEEE, 0-7803-8933-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Dickson K. W. Chiu, Benny W. C. Kwok, Ray L. S. Wong, Shing-Chi Cheung, Eleanna Kafeza |
Alert-Driven E-Service Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Nader Mohamed, Jameela Al-Jaroodi |
Temporal Web Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 637-641, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Web Alerts, Web Information, Internet, Notification Systems, Temporal Query |
38 | Chris Harrison 0001, Brian Y. Lim, Aubrey Shick, Scott E. Hudson |
Where to locate wearable displays?: reaction time performance of visual alerts from tip to toe. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 941-944, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ambient information, visual alerts, wearable computing, design research, smart clothes, reaction time |
35 | Ka Cheung Sia, Junghoo Cho, Hyun-Kyu Cho |
Efficient Monitoring Algorithm for Fast News Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 19(7), pp. 950-961, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
online information services, alert services, performance evaluation, user profiles, Information search and retrieval |
35 | Sharma Chakravarthy, Nishant Vontella |
A Publish/Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings, pp. 106-116, 2004, Springer, 3-540-24075-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Xinzhou Qin, Wenke Lee |
Discovering Novel Attack Strategies from INFOSEC Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 439-456, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Peng Ning, Dingbang Xu |
Learning attack strategies from intrusion alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 200-209, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
profiling attack strategies, intrusion detection, alert correlation |
32 | Diane K. Davies, Hein F. Vosloo, Suresh K. Santhana Vannan, Philip E. Frost |
Near real-time fire alert system in South Africa: from desktop to mobile service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Conference on Designing Interactive Systems ![In: Proceedings of the Conference on Designing Interactive Systems, Cape Town, South Africa, February 25-27, 2008, pp. 315-322, 2008, ACM, 978-1-60558-002-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
fire alerts, GIS, remote sensing, mobile technology, satellite, electricity, South Africa, web mapping services |
32 | Helen T. Sullivan, Markku T. Häkkinen, Dana Piechocinski |
Improving Participation, Accessibility and Compliance for Campus-Wide Mobile Emergency Alerting Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile Response ![In: Mobile Response, Second International Workshop on Mobile Information Technology for Emergency Response, MobileResponse 2008. Bonn, Germany, May 29-30, 2008, Revised Selected Papers, pp. 32-40, 2008, Springer, 978-3-642-00439-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Emergency Notifications, Mobile Alerts, Mobile Devices, Accessibility |
32 | Manuel Costa, Jon Crowcroft, Miguel Castro 0001, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham 0001 |
Vigilante: end-to-end containment of internet worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23-26, 2005, pp. 133-147, 2005, ACM, 1-59593-079-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
self-certifying alerts, data flow analysis, control flow analysis, worm containment |
31 | Tiago K. Colicchio, James J. Cimino |
Beyond the override: Using evidence of previous drug tolerance to suppress drug allergy alerts; a retrospective study of opioid alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Biomed. Informatics ![In: J. Biomed. Informatics 147, pp. 104508, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Angela Mastrianni, Lynn Almengor, Aleksandra Sarcevic |
Alerts as Coordination Mechanisms: Implications for Designing Alerts for Multidisciplinary and Shared Decision Making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Hum. Comput. Interact. ![In: Proc. ACM Hum. Comput. Interact. 6(GROUP), pp. 9:1-9:14, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Angela Mastrianni, Hua Cui, Aleksandra Sarcevic |
"Pop-Up Alerts are the Bane of My Existence": Designing Alerts for Cognitive Aids Used in Time-Critical Medical Settings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022, Extended Abstracts, pp. 310:1-310:7, 2022, ACM, 978-1-4503-9156-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Sonam N. Shah, Mary G. Amato, Katherine G. Garlo, Diane L. Seger, David W. Bates |
Renal medication-related clinical decision support (CDS) alerts and overrides in the inpatient setting following implementation of a commercial electronic health record: implications for designing more effective alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Am. Medical Informatics Assoc. ![In: J. Am. Medical Informatics Assoc. 28(6), pp. 1081-1087, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Demetrios Lambropoulos, Mohammad Yousefvand, Narayan B. Mandayam |
Tale of Seven Alerts: Enhancing Wireless Emergency Alerts (WEAs) to Reduce Cellular Network Usage During Disasters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2102.00589, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
31 | Christopher Watura, Sujal R. Desai |
Radiology report alerts - are emailed 'Fail-Safe' alerts acknowledged and acted upon? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Medical Informatics ![In: Int. J. Medical Informatics 133, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer |
Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21, 2016., pp. 457-464, 2016, SciTePress, 978-989-758-167-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Chris Goodman |
Triaging deforestation alerts: Clustering alerts for review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GHTC ![In: IEEE Global Humanitarian Technology Conference, GHTC 2016, Seattle, WA, USA, October 13-16, 2016, pp. 84-90, 2016, IEEE, 978-1-5090-2432-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Pamela M. Neri, Elisabeth Burdick, David W. Bates, Shobha Phansalkar |
All Alerts are not Created Equal: A Study of Differences in User Perceptions of Drug-drug and Drug-allergy Interaction Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMIA ![In: AMIA 2016, American Medical Informatics Association Annual Symposium, Chicago, IL, USA, November 12-16, 2016, 2016, AMIA. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Allison M. Miller, Maureen S. Boro, Nancy E. Korman, J. Ben Davoren |
Provider and pharmacist responses to warfarin drug-drug interaction alerts: a study of healthcare downstream of CPOE alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Am. Medical Informatics Assoc. ![In: J. Am. Medical Informatics Assoc. 18(Supplement), pp. 45-50, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Jidong Long, Daniel G. Schwartz, Sara Stoecklin |
Distinguishing false from true alerts in Snort by data mining patterns of alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410B, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Seungyon Claire Lee, Thad Starner |
BuzzWear: alert perception in wearable tactile displays on the wrist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 433-442, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
wearable computing, attention, tactile display |
29 | Steven Noel, Sushil Jajodia |
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 16(3), pp. 259-275, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Topological vulnerability analysis, Intrusion detection, Attack graphs, Sensor placement |
29 | Adam J. Oliner, Alex Aiken, Jon Stearley |
Alert Detection in System Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), December 15-19, 2008, Pisa, Italy, pp. 959-964, 2008, IEEE Computer Society, 978-0-7695-3502-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Gianni Tedesco, Uwe Aickelin |
Real-Time Alert Correlation with Type Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 173-187, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Navneet Kumar Pandey, S. K. Gupta 0001, Shaveta Leekha |
Algebra for Capability Based Attack Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings, pp. 117-135, 2008, Springer, 978-3-540-79965-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
capability model, intrusion detection, attack scenario |
29 | Sarah Smith Heckman, Laurie A. Williams |
On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEM ![In: Proceedings of the Second International Symposium on Empirical Software Engineering and Measurement, ESEM 2008, October 9-10, 2008, Kaiserslautern, Germany, pp. 41-50, 2008, ACM, 978-1-59593-971-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
alert classification, alert prioritization, automated static analysis, benchmark creation, false positive mitigation |
29 | Safaa O. Al-Mamory, Hongli Zhang 0001, Ayad R. Abbas |
Modeling network attacks for scenario construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2008, part of the IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, June 1-6, 2008, pp. 1495-1502, 2008, IEEE, 978-1-4244-1820-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke |
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings, pp. 139-150, 2008, Springer, 978-3-540-85734-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
True positive, DARPA dataset, Intrusion Detection System, False positive, Snort |
29 | Sushil Jajodia |
Topological analysis of network attack vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 2, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li |
A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (4) ![In: Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings, Volume 4, pp. 307-311, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Meng Hai-Tao |
Completeness Conditions for Accurate Alerting in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), January 7-12, 2007, Bangalore, India, 2007, IEEE, 1-4244-0614-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li, Yang-ming Ma |
Towards Identifying True Threat from Network Security Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 160-171, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Jouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Séguier |
Time series modeling for IDS alert management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 102-113, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Emmanuel Hooper |
An Intelligent Detection and Response Strategy to False Positives and Network Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 12-31, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Emmanuel Hooper |
Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 711-714, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Sushil Jajodia |
Topological analysis of network attack vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 2, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Moon Sun Shin, Kyeong Ja Jeong |
Alert Correlation Analysis in Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, Second International Conference, ADMA 2006, Xi'an, China, August 14-16, 2006, Proceedings, pp. 1049-1056, 2006, Springer, 3-540-37025-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Benjamin Morin, Hervé Debar |
Conceptual Analysis of Intrusion Alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAP ![In: Image Analysis and Processing - ICIAP 2005, 13th International Conference, Cagliari, Italy, September 6-8, 2005, Proceedings, pp. 91-98, 2005, Springer, 3-540-28869-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Ke Wang 0009, Gabriela F. Cretu, Salvatore J. Stolfo |
Anomalous Payload-Based Worm Detection and Signature Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pp. 227-246, 2005, Springer, 3-540-31778-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Minsoo Kim 0002, Jae-Hyun Seo, Seungyong Lee 0001, BongNam Noh, Jung-Taek Seo, Eung Ki Park, Choonsik Park |
An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 225-234, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Chengpo Mu, Houkuan Huang, Shengfeng Tian |
Intrusion Detection Alert Verification Based on Multi-level Fuzzy Comprehensive Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (1) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I, pp. 9-16, 2005, Springer, 3-540-30818-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Moon Sun Shin, Eun Hee Kim, Keun Ho Ryu |
False Alarm Classification Model for Network-Based Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2004, 5th International Conference, Exeter, UK, August 25-27, 2004, Proceedings, pp. 259-265, 2004, Springer, 3-540-22881-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Jouni Viinikka, Hervé Debar |
Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 166-187, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
IDS background noise, alert volume reduction, EWMA |
29 | Nen-Fu Huang, Hsien-Wei Hung, Chia-Nan Kao, Gin-Yuan Jai, Yi-Ju Sung |
Construct Efficient Hyper-alert Correlation for Defense-in-Depth Network Security System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Networking Technologies for Broadband and Mobile Networks, International Conference ICOIN 2004, Busan, Korea, February 18-20, 2004, Revised Selected Papers, pp. 886-894, 2004, Springer, 3-540-23034-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Jinqiao Yu, Y. V. Ramana Reddy, Sentil Selliah, Srinivas Kankanahalli, Sumitra Reddy, Vijayanand Bharadwaj |
TRINETR: An Intrusion Detection Alert Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), Infrastructure for Collaborative Enterprises, 14-16 June 2004, Modena, Italy, pp. 235-240, 2004, IEEE Computer Society, 0-7695-2183-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves |
Reasoning About Complementary Intrusion Evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 39-48, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Xinzhou Qin, Wenke Lee |
Statistical Causality Analysis of INFOSEC Alert Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings, pp. 73-93, 2003, Springer, 3-540-40878-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
attack scenario analysis, Intrusion detection, time series analysis, alert correlation |
Displaying result #1 - #100 of 1119 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|