The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for intruders with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-1998 (15) 1999-2000 (15) 2001-2002 (22) 2003-2004 (35) 2005 (35) 2006 (32) 2007 (41) 2008 (37) 2009 (20) 2010-2012 (18) 2013-2015 (21) 2016-2017 (19) 2018-2020 (19) 2021-2023 (20)
Publication types (Num. hits)
article(79) incollection(3) inproceedings(266) phdthesis(1)
Venues (Conferences, Journals, ...)
CoRR(9) ACSAC(6) IROS(6) Sensors(5) ESORICS(4) HICSS(4) IPSN(4) ISC(4) RAID(4) AINA(3) ATC(3) CCS(3) Comput. Networks(3) Comput. Secur.(3) CSFW(3) IAS(3) More (+10 of total 264)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 213 occurrences of 169 keywords

Results
Found 349 publication records. Showing 349 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
68Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang Resistance Analysis to Intruders' Evasion of Detecting Intrusion. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF time perturbation, chaff, intrusion detection, Network security, stepping-stone, evasion
67Kymie M. C. Tan, Blair R. Collie Detection and Classification of TCP/IP Network Services. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF TCP/IP network service classification, computer intruders, remote terminal software, undetectable access, system audit, intruder activity detection, unauthorised network services, network connection signature, neural network, learning, monitoring, experiment, transport protocols, data security, network traffic, generalisation, Australia, law enforcement
57Yongzhong Zhang, Jianhua Yang, Chunming Ye Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
57Kunikazu Yoda, Hiroaki Etoh Finding a Connection Chain for Tracing Intruders. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
45Omar U. Flórez-Choque, Ernesto Cuadros-Vargas A Biologically Motivated Computational Architecture Inspired in the Human Immunological System to Quantify Abnormal Behaviors to Detect Presence of Intruders. Search on Bibsonomy BICC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Luigi Ciminiera, Adriano Valenzano Authentication Mechanisms in Microprocessor-Based Local Area Networks. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF authentication mechanisms, microprocessor-based local area networks, unauthorized use, intruders, interface process, user-server connection, unauthorized requests, capability checking, iAPX432-based hosts, database, cache, searching, service, local area networks, security of data, identity, protect, server, hardware support, shared resources, parallel search, access rights, check, performance issues
35Benyuan Liu, Olivier Dousse, Jie Wang 0002, Anwar Saipulla Strong barrier coverage of wireless sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor networks, algorithm, coverage
35Jörg Drechsler, Jerome P. Reiter Accounting for Intruder Uncertainty Due to Sampling When Estimating Identification Disclosure Risks in Partially Synthetic Data. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Risk, CART, Disclosure, Synthetic data
35Boting Yang, Yi Cao Monotonicity of strong searching on digraphs. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cops-and-robber game, Pursuit-and-evasion problem, NP-complete, Monotonicity, Graph searching, Digraph
35Jeffrey V. Nickerson, Stephan Olariu Protecting with Sensor Networks: Attention and Response. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Boting Yang, Yi Cao Digraph Strong Searching: Monotonicity and Complexity. Search on Bibsonomy AAIM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Satoshi Kawabata, Shinsaku Hiura, Kosuke Sato Real-Time Detection of Anomalous Objects in Dynamic Scene. Search on Bibsonomy ICPR (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Ajith Abraham, Ravi Jain Soft Computing Models for Network Intrusion Detection Systems. Search on Bibsonomy Classification and Clustering for Knowledge Discovery The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Victor C. S. Lee, John A. Stankovic, Sang Hyuk Son Intrusion Detection in Real-Time Database Systems via Time Signatures. Search on Bibsonomy IEEE Real Time Technology and Applications Symposium The full citation details ... 2000 DBLP  DOI  BibTeX  RDF time signature, performance evaluation, intrusion detection, real-time database systems
34Vito Di Gesù, Giosuè Lo Bosco, Jerome H. Friedman Intruders pattern identification. Search on Bibsonomy ICPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, T. J. Jankun-Kelly Detecting Flaws and Intruders with Visual Data Analysis. Search on Bibsonomy IEEE Computer Graphics and Applications The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Donald Stanley, Boting Yang Lower Bounds on Fast Searching. Search on Bibsonomy ISAAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Chih-Yung Chang, Li-Ling Hung, Yu-Chieh Chen, Ming-Hsien Li On-supporting energy balanced k-barrier coverage in wireless sensor networks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, distributed, barrier coverage
23Ashish Kamra, Evimaria Terzi, Elisa Bertino Detecting anomalous access patterns in relational databases. Search on Bibsonomy VLDB J. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion detection, Anomaly detection, RBAC, DBMS, User profiles
23YuanYuan Li, Lynne E. Parker Detecting and monitoring time-related abnormal events using a wireless sensor network and mobile robot. Search on Bibsonomy IROS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Jill K. Nelson, Errol G. Rowe, G. Clifford Carter Detection capabilities of randomly-deployed underwater sensors. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Zhengdao Zhang, Zhumiao Peng, Zhiping Zhou The Study of Intrusion Prediction Based on HsMM. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Volkan Ustun, Jeffrey S. Smith Mental simulation for creating realistic behavior in physical security systems simulation. Search on Bibsonomy WSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Jianhua Yang, Byong Lee Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Erdal Cayirci Sensor Network Applications Implemented by Industry and Their Security Challenges. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Binay K. Bhattacharya, Mike Burmester, Yuzhuang Hu, Evangelos Kranakis, Qiaosheng Shi, Andreas Wiese Optimal Movement of Mobile Sensors for Barrier Coverage of a Planar Region. Search on Bibsonomy COCOA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Emmanuel Velasco, Weifeng Chen 0001, Ping Ji 0002, Raymond Hsieh Wireless Forensic: A New Radio Frequency Based Locating System. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Patrick P. C. Lee, Vishal Misra, Dan Rubenstein Distributed algorithms for secure multipath routing in attack-resistant networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attack-resistant networks, preflow-push, security, optimization, resilience, multipath routing, maximum-flow problems
23Brian Alspach, Danny Dyer, Denis Hanson, Boting Yang Lower Bounds on Edge Searching. Search on Bibsonomy ESCAPE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Grant Cermak, Karl Keyzer Unsupervised Intrusion Detection Using Color Images. Search on Bibsonomy ISVC (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Xiaojun Ye, Zude Li, Yongnian Li Capture Inference Attacks for K-Anonymity with Privacy Inference Logic. Search on Bibsonomy DASFAA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Ying-Wei Kuo, Shou-Hsuan Stephen Huang Stepping-stone detection algorithm based on order preserving mapping. Search on Bibsonomy ICPADS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Sergio de Oliveira, Hao Chi Wong, José Marcos S. Nogueira NEKAP: Intruder Resilient and Energy Efficient Key Establishment in Sensor Networks. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang HonIDS: Enhancing Honeypot System with Intrusion Detection Models. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23John Z. Zhang, Tsunehiko Kameda Where to Build a Door. Search on Bibsonomy IROS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Giovanni Di Crescenzo, Richard J. Lipton, Shabsi Walfish Perfectly Secure Password Protocols in the Bounded Retrieval Model. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Siu Fung Yeung, John C. S. Lui, David K. Y. Yau A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Santosh Kumar 0001, Ten-Hwang Lai, Anish Arora Barrier coverage with wireless sensors. Search on Bibsonomy MobiCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF critical conditions, wireless sensor networks, coverage, network topology, localized algorithms, random geometric graphs, barrier coverage
23Nan Zhang 0003, Mark Ryan 0001, Dimitar P. Guelev Evaluating Access Control Policies Through Model Checking. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access control policy language, model checking, verification, access control, access control model, access control policy
23Patrick P. C. Lee, Vishal Misra, Dan Rubenstein Distributed algorithms for secure multipath routing. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athena Vakali Intrusion Detection in RBAC-administered Databases. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Dongxi Liu, Chi-Hung Chi, Ming Li 0002 Normalizing Traffic Pattern with Anonymity for Mission Critical Applications. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Jianguo Ding, Shihao Xu, Bernd J. Krämer, Yingcai Bai, Hansheng Chen 0003, Jun Zhang Probabilistic Inference Strategy in Distributed Intrusion Detection Systems. Search on Bibsonomy ISPA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Bill McCarty Automated Identity Theft. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC
23Jing Deng 0002, Richard Han 0001, Shivakant Mishra A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Robert H. Deng, Jianying Zhou 0001, Feng Bao 0001 Defending against redirect attacks in mobile IP. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF mobile IP security, redirect attack, secure binding update, mobile IP, authenticated key-exchange
23Siu Fung Yeung, John C. S. Lui, David K. Y. Yau A case for a multi-key secure video proxy: theory, design, and implementation. Search on Bibsonomy ACM Multimedia The full citation details ... 2002 DBLP  DOI  BibTeX  RDF asymmetric parametric sequence functions, multi-key RSA, video proxy, security
23Heejin Jang, Sangwook Kim An intruder tracing system based on a shadowing mechanism. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Heejin Jang, Sangwook Kim Real-Time Intruder Tracing through Self-Replication. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Juan José Salazar González Extending Cell Suppression to Protect Tabular Data against Several Attackers. Search on Bibsonomy Inference Control in Statistical Databases The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Richard C. Linger Systematic Generation of Stochastic Diversity as an Intrusion Barrier in Survivable Systems Software. Search on Bibsonomy HICSS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
22Arman Pourghorban, Dipankar Maity Target Defense against Periodically Arriving Intruders. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Shridhar Velhal, Suresh Sundaram 0002, Narasimhan Sundararajan Priority-based DREAM Approach for Highly Manoeuvring Intruders in A Perimeter Defense Problem. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Ali Moltajaei Farid, Mei Kuan Lim, Md. Abdus Samad Kamal, Koksheik Wong Effective UAV patrolling for swarm of intruders with heterogeneous behavior. Search on Bibsonomy Robotica The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Ahmad Elleathy, Faris Alhumaidan, Mohammed Alqahtani, Ahmed Almaiman, Amr M. Ragheb, Ahmed B. Ibrahim, Jameel Ali, Maged Abdullah Esmail, Saleh A. Alshebeili Strain FBG-Based Sensor for Detecting Fence Intruders Using Machine Learning and Adaptive Thresholding. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Najeeb Al-Khalli, Saud Alateeq, Mohammed Almansour, Yousef AlHassoun, Ahmed B. Ibrahim, Saleh A. Alshebeili Real-Time Detection of Intruders Using an Acoustic Sensor and Internet-of-Things Computing. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Jinpeng Han, Xiaoguang Chen, Manzhi Yang, Rouxing Huai PatrolGo: Efficient Security Patrol Route Planning to Catch Intruders. Search on Bibsonomy DTPI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Arman Pourghorban, Dipankar Maity Target Defense against Periodically Arriving Intruders. Search on Bibsonomy ACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Richa Sharma, Teek Parval Sharma, Ajay Kumar Sharma Detecting and Preventing Misbehaving Intruders in the Internet of Vehicles. Search on Bibsonomy Int. J. Cloud Appl. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Matteo Santilli, Mauro Franceschelli, Andrea Gasparri Secure rendezvous and static containment in multi-agent systems with adversarial intruders. Search on Bibsonomy Autom. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Arman Pourghorban, Michael R. Dorothy, Daigo Shishika, Alexander Von Moll, Dipankar Maity Target Defense against Sequentially Arriving Intruders. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Harsh Namdev Bhor, Mukesh Kalla TRUST-based features for detecting the intruders in the Internet of Things network using deep learning. Search on Bibsonomy Comput. Intell. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Arman Pourghorban, Michael R. Dorothy, Daigo Shishika, Alexander Von Moll, Dipankar Maity Target Defense against Sequentially Arriving Intruders. Search on Bibsonomy CDC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Neilly H. Tan, Richmond Y. Wong, Audrey Desjardins, Sean A. Munson, James Pierce Monitoring Pets, Deterring Intruders, and Casually Spying on Neighbors: Everyday Uses of Smart Home Cameras. Search on Bibsonomy CHI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Claudio Cimarelli Perception for Surveillance: Learning Self-localisation and Intruders Detection from Monocular Images of an Aerial robot in Outdoor Urban Environments. Search on Bibsonomy 2022   RDF
22David Petrizze, Kasra Koorehdavoudi, Mengran Xue, Sandip Roy 0002 Distinguishing Aerial Intruders from Trajectory Data: A Model-Based Hypothesis-Testing Approach. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
22Ali Marzoughi, Andrey V. Savkin Autonomous Navigation of a Team of Unmanned Surface Vehicles for Intercepting Intruders on a Region Boundary. Search on Bibsonomy Sensors The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22David Petrizze, Kasra Koorehdavoudi, Mengran Xue, Sandip Roy 0002 Distinguishing Aerial Intruders from Trajectory Data: A Model-Based Hypothesis-Testing Approach. Search on Bibsonomy ACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Péter Bauer Applicability of Different Mono Camera-based Aircraft Sense and Avoid Methods for Steady and Linear Path Intruders. Search on Bibsonomy MED The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Zhadyra Avkurova, Sergiy Gnatyuk, Bayan Abduraimova, Solomiia Fedushko, Yuriy Syerov, Olha Trach Models for early web-attacks detection and intruders identification based on fuzzy logic. Search on Bibsonomy EUSPN/ICTH The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Yevhen Vasiliu, Tetiana Okhrimenko, Andriy Fesenko, Sergiy Dorozhynskyy Passive Eavesdropping Attack of Several Intruders on Deterministic Protocol with Pairs of Entangled Qubits. Search on Bibsonomy IDAACS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Wenming Wang, Haiping Huang, Qi Li 0011, Fan He, Chao Sha Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Deepak Kumar Verma, Ashwani Kush, Renu Jain Identifying Intruders in MANET: Exploiting RREP Message of AODV Protocol. Search on Bibsonomy Int. J. Inf. Technol. Proj. Manag. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Muhammad Usman Arif Decentralized decision making and navigation strategy for tracking intruders in a cluttered area by a group of mobile robots. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
22Caitao Zhan, Himanshu Gupta 0001, Arani Bhattacharya, Mohammad Ghaderibaneh Efficient Localization of Multiple Intruders in Shared Spectrum System. Search on Bibsonomy IPSN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Tadashi Shoji, Munehiro Takimoto, Yasushi Kambayashi Capture of Multi Intruders by Cooperative Multiple Robots using Mobile Agents. Search on Bibsonomy ICAART (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Yasushi Kambayashi, Taichi Sekido, Munehiro Takimoto Capture of Intruders by Cooperative Multiple Robots Using Mobile Agents. Search on Bibsonomy IHSI The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Daigo Shishika, Derek A. Paley Mosquito-inspired distributed swarming and pursuit for cooperative defense against fast intruders. Search on Bibsonomy Auton. Robots The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Bo Lei, Yao Zhang 0008, Yixin Yang 0001 Detection of Sound Field Aberrations Caused by Forward Scattering From Underwater Intruders Using Unsupervised Machine Learning. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22N. Bhalaji 0001, S. Venkatesh Enhanced analysis of border surveillance using intruders' crossing strategies. Search on Bibsonomy Soft Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22C. Pavan Kumar 0001, R. Selvakumar 0001 Mitigating the interferences and intruders in cognitive radio networks using an authentication protocol over Reed-Solomon codes. Search on Bibsonomy Int. J. Commun. Networks Distributed Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Abraão Aires Urquiza, Musab A. AlTurki, Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott Resource-Bounded Intruders in Denial of Service Attacks. Search on Bibsonomy CSF The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Shou-Hsuan Stephen Huang, Zechun Cao, Calvin E. Raines, Mai N. Yang, Camille Simon 0002 Detecting Intruders by User File Access Patterns. Search on Bibsonomy NSS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Haiping Huang, Tianhe Gong, Rong Zhang 0001, Lie-Liang Yang, Jiancong Zhang, Fu Xiao 0001 Intrusion Detection Based on k-Coverage in Mobile Sensor Networks With Empowered Intruders. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22T. D. Ovasapyan, Dmitry A. Moskvin, Maxim O. Kalinin Using Neural Networks to Detect Internal Intruders in VANETs. Search on Bibsonomy Autom. Control. Comput. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Guillermo J. Laguna, Sourabh Bhattacharya Tracking Mobile Intruders in an Art Gallery: Guard Deployment Strategies, Fundamental Limitations, and Performance Guarantees. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
22Pramuditha Perera, Vishal M. Patel 0001 Efficient and Low Latency Detection of Intruders in Mobile Active Authentication. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Kazuki Kajita, Eiji Konaka Hard-to-predict routing algorithm from intruders for autonomous surveillance robots. Search on Bibsonomy IECON The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Zechun Cao, Shou-Hsuan Stephen Huang Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection. Search on Bibsonomy TrustCom/BigDataSE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Jyoti Neeli, N. K. Cauvery Framework for Capturing the Intruders in Wireless Adhoc Network Using Zombie Node. Search on Bibsonomy CSOC (3) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Hichem Sedjelmaci, Sidi Mohammed Senouci, Tarek Bouali Predict and prevent from misbehaving intruders in heterogeneous vehicular networks. Search on Bibsonomy Veh. Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul, Congduc Pham Low Cost Monitoring and Intruders Detection using Wireless Video Sensor Networks. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
22Corine M. Laan, Tom van der Mijden, Ana Isabel Barros, Richard J. Boucherie, Herman Monsuur An interdiction game on a queueing network with multiple intruders. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Awais Yousaf, Asim Loan, Radu F. Babiceanu, Leandros A. Maglaras, Onaiza Yousaf Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems. Search on Bibsonomy Comput. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Hamza Attak, Marco Casassa Mont, Cristian Dávila, Eleni-Constantina Davri, Carolina Fernandez, Georgios Gardikis, Bernat Gastón, Ludovic Jacquin, Antonio Lioy, Antonis Litke, Nikolaos K. Papadakis, Dimitris Papadopoulos, Jerónimo Núñez, Eleni Trouva SHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment. Search on Bibsonomy Guide to Security in SDN and NFV The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali How Web Services Can Be Tolerant to Intruders through Diversification. Search on Bibsonomy ICWS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Andrey V. Savkin, Ali Marzoughi Distributed control of a robotic network for protection of a region from intruders. Search on Bibsonomy ROBIO The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Mohammad J. Abdel-Rahman, Dima Abu-Aysheh, Ahmad I. Abu-El-Haija, Rasheed J. Abu-Aysheh, Hazem M. Al-Najjar Detecting Intruders by Wireless Sensor Networks. Search on Bibsonomy Ad Hoc Sens. Wirel. Networks The full citation details ... 2016 DBLP  BibTeX  RDF
22Yun Wang, William Chu, Sarah Fields, Colleen Heinemann, Zach Reiter Detection of Intelligent Intruders in Wireless Sensor Networks. Search on Bibsonomy Future Internet The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Josep Domingo-Ferrer, Krishnamurty Muralidhar New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to users. Search on Bibsonomy Inf. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 349 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license