Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
68 | Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang |
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
time perturbation, chaff, intrusion detection, Network security, stepping-stone, evasion |
67 | Kymie M. C. Tan, Blair R. Collie |
Detection and Classification of TCP/IP Network Services. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
TCP/IP network service classification, computer intruders, remote terminal software, undetectable access, system audit, intruder activity detection, unauthorised network services, network connection signature, neural network, learning, monitoring, experiment, transport protocols, data security, network traffic, generalisation, Australia, law enforcement |
57 | Yongzhong Zhang, Jianhua Yang, Chunming Ye |
Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Kunikazu Yoda, Hiroaki Etoh |
Finding a Connection Chain for Tracing Intruders. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
45 | Omar U. Flórez-Choque, Ernesto Cuadros-Vargas |
A Biologically Motivated Computational Architecture Inspired in the Human Immunological System to Quantify Abnormal Behaviors to Detect Presence of Intruders. |
BICC |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Luigi Ciminiera, Adriano Valenzano |
Authentication Mechanisms in Microprocessor-Based Local Area Networks. |
IEEE Trans. Software Eng. |
1989 |
DBLP DOI BibTeX RDF |
authentication mechanisms, microprocessor-based local area networks, unauthorized use, intruders, interface process, user-server connection, unauthorized requests, capability checking, iAPX432-based hosts, database, cache, searching, service, local area networks, security of data, identity, protect, server, hardware support, shared resources, parallel search, access rights, check, performance issues |
35 | Benyuan Liu, Olivier Dousse, Jie Wang 0002, Anwar Saipulla |
Strong barrier coverage of wireless sensor networks. |
MobiHoc |
2008 |
DBLP DOI BibTeX RDF |
sensor networks, algorithm, coverage |
35 | Jörg Drechsler, Jerome P. Reiter |
Accounting for Intruder Uncertainty Due to Sampling When Estimating Identification Disclosure Risks in Partially Synthetic Data. |
Privacy in Statistical Databases |
2008 |
DBLP DOI BibTeX RDF |
Risk, CART, Disclosure, Synthetic data |
35 | Boting Yang, Yi Cao |
Monotonicity of strong searching on digraphs. |
J. Comb. Optim. |
2007 |
DBLP DOI BibTeX RDF |
Cops-and-robber game, Pursuit-and-evasion problem, NP-complete, Monotonicity, Graph searching, Digraph |
35 | Jeffrey V. Nickerson, Stephan Olariu |
Protecting with Sensor Networks: Attention and Response. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Boting Yang, Yi Cao |
Digraph Strong Searching: Monotonicity and Complexity. |
AAIM |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Satoshi Kawabata, Shinsaku Hiura, Kosuke Sato |
Real-Time Detection of Anomalous Objects in Dynamic Scene. |
ICPR (3) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Ajith Abraham, Ravi Jain |
Soft Computing Models for Network Intrusion Detection Systems. |
Classification and Clustering for Knowledge Discovery |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Victor C. S. Lee, John A. Stankovic, Sang Hyuk Son |
Intrusion Detection in Real-Time Database Systems via Time Signatures. |
IEEE Real Time Technology and Applications Symposium |
2000 |
DBLP DOI BibTeX RDF |
time signature, performance evaluation, intrusion detection, real-time database systems |
34 | Vito Di Gesù, Giosuè Lo Bosco, Jerome H. Friedman |
Intruders pattern identification. |
ICPR |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, T. J. Jankun-Kelly |
Detecting Flaws and Intruders with Visual Data Analysis. |
IEEE Computer Graphics and Applications |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Donald Stanley, Boting Yang |
Lower Bounds on Fast Searching. |
ISAAC |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Chih-Yung Chang, Li-Ling Hung, Yu-Chieh Chen, Ming-Hsien Li |
On-supporting energy balanced k-barrier coverage in wireless sensor networks. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, distributed, barrier coverage |
23 | Ashish Kamra, Evimaria Terzi, Elisa Bertino |
Detecting anomalous access patterns in relational databases. |
VLDB J. |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection, Anomaly detection, RBAC, DBMS, User profiles |
23 | YuanYuan Li, Lynne E. Parker |
Detecting and monitoring time-related abnormal events using a wireless sensor network and mobile robot. |
IROS |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Jill K. Nelson, Errol G. Rowe, G. Clifford Carter |
Detection capabilities of randomly-deployed underwater sensors. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Zhengdao Zhang, Zhumiao Peng, Zhiping Zhou |
The Study of Intrusion Prediction Based on HsMM. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Volkan Ustun, Jeffrey S. Smith |
Mental simulation for creating realistic behavior in physical security systems simulation. |
WSC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Jianhua Yang, Byong Lee |
Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Erdal Cayirci |
Sensor Network Applications Implemented by Industry and Their Security Challenges. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Binay K. Bhattacharya, Mike Burmester, Yuzhuang Hu, Evangelos Kranakis, Qiaosheng Shi, Andreas Wiese |
Optimal Movement of Mobile Sensors for Barrier Coverage of a Planar Region. |
COCOA |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Emmanuel Velasco, Weifeng Chen 0001, Ping Ji 0002, Raymond Hsieh |
Wireless Forensic: A New Radio Frequency Based Locating System. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Patrick P. C. Lee, Vishal Misra, Dan Rubenstein |
Distributed algorithms for secure multipath routing in attack-resistant networks. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
attack-resistant networks, preflow-push, security, optimization, resilience, multipath routing, maximum-flow problems |
23 | Brian Alspach, Danny Dyer, Denis Hanson, Boting Yang |
Lower Bounds on Edge Searching. |
ESCAPE |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Grant Cermak, Karl Keyzer |
Unsupervised Intrusion Detection Using Color Images. |
ISVC (2) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Xiaojun Ye, Zude Li, Yongnian Li |
Capture Inference Attacks for K-Anonymity with Privacy Inference Logic. |
DASFAA |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
Stepping-stone detection algorithm based on order preserving mapping. |
ICPADS |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Sergio de Oliveira, Hao Chi Wong, José Marcos S. Nogueira |
NEKAP: Intruder Resilient and Energy Efficient Key Establishment in Sensor Networks. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang |
HonIDS: Enhancing Honeypot System with Intrusion Detection Models. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
23 | John Z. Zhang, Tsunehiko Kameda |
Where to Build a Door. |
IROS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Giovanni Di Crescenzo, Richard J. Lipton, Shabsi Walfish |
Perfectly Secure Password Protocols in the Bounded Retrieval Model. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Siu Fung Yeung, John C. S. Lui, David K. Y. Yau |
A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation. |
IEEE Trans. Multim. |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Santosh Kumar 0001, Ten-Hwang Lai, Anish Arora |
Barrier coverage with wireless sensors. |
MobiCom |
2005 |
DBLP DOI BibTeX RDF |
critical conditions, wireless sensor networks, coverage, network topology, localized algorithms, random geometric graphs, barrier coverage |
23 | Nan Zhang 0003, Mark Ryan 0001, Dimitar P. Guelev |
Evaluating Access Control Policies Through Model Checking. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
access control policy language, model checking, verification, access control, access control model, access control policy |
23 | Patrick P. C. Lee, Vishal Misra, Dan Rubenstein |
Distributed algorithms for secure multipath routing. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athena Vakali |
Intrusion Detection in RBAC-administered Databases. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Dongxi Liu, Chi-Hung Chi, Ming Li 0002 |
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications. |
Annual Simulation Symposium |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Jianguo Ding, Shihao Xu, Bernd J. Krämer, Yingcai Bai, Hansheng Chen 0003, Jun Zhang |
Probabilistic Inference Strategy in Distributed Intrusion Detection Systems. |
ISPA |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Bill McCarty |
Automated Identity Theft. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC |
23 | Jing Deng 0002, Richard Han 0001, Shivakant Mishra |
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. |
IPSN |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Robert H. Deng, Jianying Zhou 0001, Feng Bao 0001 |
Defending against redirect attacks in mobile IP. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
mobile IP security, redirect attack, secure binding update, mobile IP, authenticated key-exchange |
23 | Siu Fung Yeung, John C. S. Lui, David K. Y. Yau |
A case for a multi-key secure video proxy: theory, design, and implementation. |
ACM Multimedia |
2002 |
DBLP DOI BibTeX RDF |
asymmetric parametric sequence functions, multi-key RSA, video proxy, security |
23 | Heejin Jang, Sangwook Kim |
An intruder tracing system based on a shadowing mechanism. |
ISCC |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Heejin Jang, Sangwook Kim |
Real-Time Intruder Tracing through Self-Replication. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Juan José Salazar González |
Extending Cell Suppression to Protect Tabular Data against Several Attackers. |
Inference Control in Statistical Databases |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Richard C. Linger |
Systematic Generation of Stochastic Diversity as an Intrusion Barrier in Survivable Systems Software. |
HICSS |
1999 |
DBLP DOI BibTeX RDF |
|
22 | Arman Pourghorban, Dipankar Maity |
Target Defense against Periodically Arriving Intruders. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Shridhar Velhal, Suresh Sundaram 0002, Narasimhan Sundararajan |
Priority-based DREAM Approach for Highly Manoeuvring Intruders in A Perimeter Defense Problem. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Ali Moltajaei Farid, Mei Kuan Lim, Md. Abdus Samad Kamal, Koksheik Wong |
Effective UAV patrolling for swarm of intruders with heterogeneous behavior. |
Robotica |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Ahmad Elleathy, Faris Alhumaidan, Mohammed Alqahtani, Ahmed Almaiman, Amr M. Ragheb, Ahmed B. Ibrahim, Jameel Ali, Maged Abdullah Esmail, Saleh A. Alshebeili |
Strain FBG-Based Sensor for Detecting Fence Intruders Using Machine Learning and Adaptive Thresholding. |
Sensors |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Najeeb Al-Khalli, Saud Alateeq, Mohammed Almansour, Yousef AlHassoun, Ahmed B. Ibrahim, Saleh A. Alshebeili |
Real-Time Detection of Intruders Using an Acoustic Sensor and Internet-of-Things Computing. |
Sensors |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Jinpeng Han, Xiaoguang Chen, Manzhi Yang, Rouxing Huai |
PatrolGo: Efficient Security Patrol Route Planning to Catch Intruders. |
DTPI |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Arman Pourghorban, Dipankar Maity |
Target Defense against Periodically Arriving Intruders. |
ACC |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Richa Sharma, Teek Parval Sharma, Ajay Kumar Sharma |
Detecting and Preventing Misbehaving Intruders in the Internet of Vehicles. |
Int. J. Cloud Appl. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Matteo Santilli, Mauro Franceschelli, Andrea Gasparri |
Secure rendezvous and static containment in multi-agent systems with adversarial intruders. |
Autom. |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Arman Pourghorban, Michael R. Dorothy, Daigo Shishika, Alexander Von Moll, Dipankar Maity |
Target Defense against Sequentially Arriving Intruders. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Harsh Namdev Bhor, Mukesh Kalla |
TRUST-based features for detecting the intruders in the Internet of Things network using deep learning. |
Comput. Intell. |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Arman Pourghorban, Michael R. Dorothy, Daigo Shishika, Alexander Von Moll, Dipankar Maity |
Target Defense against Sequentially Arriving Intruders. |
CDC |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Neilly H. Tan, Richmond Y. Wong, Audrey Desjardins, Sean A. Munson, James Pierce |
Monitoring Pets, Deterring Intruders, and Casually Spying on Neighbors: Everyday Uses of Smart Home Cameras. |
CHI |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Claudio Cimarelli |
Perception for Surveillance: Learning Self-localisation and Intruders Detection from Monocular Images of an Aerial robot in Outdoor Urban Environments. |
|
2022 |
RDF |
|
22 | David Petrizze, Kasra Koorehdavoudi, Mengran Xue, Sandip Roy 0002 |
Distinguishing Aerial Intruders from Trajectory Data: A Model-Based Hypothesis-Testing Approach. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
22 | Ali Marzoughi, Andrey V. Savkin |
Autonomous Navigation of a Team of Unmanned Surface Vehicles for Intercepting Intruders on a Region Boundary. |
Sensors |
2021 |
DBLP DOI BibTeX RDF |
|
22 | David Petrizze, Kasra Koorehdavoudi, Mengran Xue, Sandip Roy 0002 |
Distinguishing Aerial Intruders from Trajectory Data: A Model-Based Hypothesis-Testing Approach. |
ACC |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Péter Bauer |
Applicability of Different Mono Camera-based Aircraft Sense and Avoid Methods for Steady and Linear Path Intruders. |
MED |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Zhadyra Avkurova, Sergiy Gnatyuk, Bayan Abduraimova, Solomiia Fedushko, Yuriy Syerov, Olha Trach |
Models for early web-attacks detection and intruders identification based on fuzzy logic. |
EUSPN/ICTH |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Yevhen Vasiliu, Tetiana Okhrimenko, Andriy Fesenko, Sergiy Dorozhynskyy |
Passive Eavesdropping Attack of Several Intruders on Deterministic Protocol with Pairs of Entangled Qubits. |
IDAACS |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Wenming Wang, Haiping Huang, Qi Li 0011, Fan He, Chao Sha |
Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Deepak Kumar Verma, Ashwani Kush, Renu Jain |
Identifying Intruders in MANET: Exploiting RREP Message of AODV Protocol. |
Int. J. Inf. Technol. Proj. Manag. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Muhammad Usman Arif |
Decentralized decision making and navigation strategy for tracking intruders in a cluttered area by a group of mobile robots. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
22 | Caitao Zhan, Himanshu Gupta 0001, Arani Bhattacharya, Mohammad Ghaderibaneh |
Efficient Localization of Multiple Intruders in Shared Spectrum System. |
IPSN |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Tadashi Shoji, Munehiro Takimoto, Yasushi Kambayashi |
Capture of Multi Intruders by Cooperative Multiple Robots using Mobile Agents. |
ICAART (1) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Yasushi Kambayashi, Taichi Sekido, Munehiro Takimoto |
Capture of Intruders by Cooperative Multiple Robots Using Mobile Agents. |
IHSI |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Daigo Shishika, Derek A. Paley |
Mosquito-inspired distributed swarming and pursuit for cooperative defense against fast intruders. |
Auton. Robots |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Bo Lei, Yao Zhang 0008, Yixin Yang 0001 |
Detection of Sound Field Aberrations Caused by Forward Scattering From Underwater Intruders Using Unsupervised Machine Learning. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
22 | N. Bhalaji 0001, S. Venkatesh |
Enhanced analysis of border surveillance using intruders' crossing strategies. |
Soft Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
22 | C. Pavan Kumar 0001, R. Selvakumar 0001 |
Mitigating the interferences and intruders in cognitive radio networks using an authentication protocol over Reed-Solomon codes. |
Int. J. Commun. Networks Distributed Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Abraão Aires Urquiza, Musab A. AlTurki, Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott |
Resource-Bounded Intruders in Denial of Service Attacks. |
CSF |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Shou-Hsuan Stephen Huang, Zechun Cao, Calvin E. Raines, Mai N. Yang, Camille Simon 0002 |
Detecting Intruders by User File Access Patterns. |
NSS |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Haiping Huang, Tianhe Gong, Rong Zhang 0001, Lie-Liang Yang, Jiancong Zhang, Fu Xiao 0001 |
Intrusion Detection Based on k-Coverage in Mobile Sensor Networks With Empowered Intruders. |
IEEE Trans. Veh. Technol. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | T. D. Ovasapyan, Dmitry A. Moskvin, Maxim O. Kalinin |
Using Neural Networks to Detect Internal Intruders in VANETs. |
Autom. Control. Comput. Sci. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Guillermo J. Laguna, Sourabh Bhattacharya |
Tracking Mobile Intruders in an Art Gallery: Guard Deployment Strategies, Fundamental Limitations, and Performance Guarantees. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
22 | Pramuditha Perera, Vishal M. Patel 0001 |
Efficient and Low Latency Detection of Intruders in Mobile Active Authentication. |
IEEE Trans. Inf. Forensics Secur. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Kazuki Kajita, Eiji Konaka |
Hard-to-predict routing algorithm from intruders for autonomous surveillance robots. |
IECON |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Zechun Cao, Shou-Hsuan Stephen Huang |
Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection. |
TrustCom/BigDataSE |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Jyoti Neeli, N. K. Cauvery |
Framework for Capturing the Intruders in Wireless Adhoc Network Using Zombie Node. |
CSOC (3) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Hichem Sedjelmaci, Sidi Mohammed Senouci, Tarek Bouali |
Predict and prevent from misbehaving intruders in heterogeneous vehicular networks. |
Veh. Commun. |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul, Congduc Pham |
Low Cost Monitoring and Intruders Detection using Wireless Video Sensor Networks. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
22 | Corine M. Laan, Tom van der Mijden, Ana Isabel Barros, Richard J. Boucherie, Herman Monsuur |
An interdiction game on a queueing network with multiple intruders. |
Eur. J. Oper. Res. |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Awais Yousaf, Asim Loan, Radu F. Babiceanu, Leandros A. Maglaras, Onaiza Yousaf |
Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems. |
Comput. Secur. |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Hamza Attak, Marco Casassa Mont, Cristian Dávila, Eleni-Constantina Davri, Carolina Fernandez, Georgios Gardikis, Bernat Gastón, Ludovic Jacquin, Antonio Lioy, Antonis Litke, Nikolaos K. Papadakis, Dimitris Papadopoulos, Jerónimo Núñez, Eleni Trouva |
SHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment. |
Guide to Security in SDN and NFV |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali |
How Web Services Can Be Tolerant to Intruders through Diversification. |
ICWS |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Andrey V. Savkin, Ali Marzoughi |
Distributed control of a robotic network for protection of a region from intruders. |
ROBIO |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Mohammad J. Abdel-Rahman, Dima Abu-Aysheh, Ahmad I. Abu-El-Haija, Rasheed J. Abu-Aysheh, Hazem M. Al-Najjar |
Detecting Intruders by Wireless Sensor Networks. |
Ad Hoc Sens. Wirel. Networks |
2016 |
DBLP BibTeX RDF |
|
22 | Yun Wang, William Chu, Sarah Fields, Colleen Heinemann, Zach Reiter |
Detection of Intelligent Intruders in Wireless Sensor Networks. |
Future Internet |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Josep Domingo-Ferrer, Krishnamurty Muralidhar |
New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to users. |
Inf. Sci. |
2016 |
DBLP DOI BibTeX RDF |
|