Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
68 | Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang |
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 383-397, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
time perturbation, chaff, intrusion detection, Network security, stepping-stone, evasion |
67 | Kymie M. C. Tan, Blair R. Collie |
Detection and Classification of TCP/IP Network Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 99-107, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
TCP/IP network service classification, computer intruders, remote terminal software, undetectable access, system audit, intruder activity detection, unauthorised network services, network connection signature, neural network, learning, monitoring, experiment, transport protocols, data security, network traffic, generalisation, Australia, law enforcement |
57 | Yongzhong Zhang, Jianhua Yang, Chunming Ye |
Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 477-486, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Kunikazu Yoda, Hiroaki Etoh |
Finding a Connection Chain for Tracing Intruders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings, pp. 191-205, 2000, Springer, 3-540-41031-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
45 | Omar U. Flórez-Choque, Ernesto Cuadros-Vargas |
A Biologically Motivated Computational Architecture Inspired in the Human Immunological System to Quantify Abnormal Behaviors to Detect Presence of Intruders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BICC ![In: Biologically Inspired Cooperative Computing, IFIP 19th World Computer Congress, TC 10: 1st IFIP International Conference on Biologically Inspired Computing, August 21-24, 2006, Santiago, Chile, pp. 95-106, 2006, Springer, 978-0-387-34632-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Luigi Ciminiera, Adriano Valenzano |
Authentication Mechanisms in Microprocessor-Based Local Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 15(5), pp. 654-658, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
authentication mechanisms, microprocessor-based local area networks, unauthorized use, intruders, interface process, user-server connection, unauthorized requests, capability checking, iAPX432-based hosts, database, cache, searching, service, local area networks, security of data, identity, protect, server, hardware support, shared resources, parallel search, access rights, check, performance issues |
35 | Benyuan Liu, Olivier Dousse, Jie Wang 0002, Anwar Saipulla |
Strong barrier coverage of wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, Hong Kong, China, May 26-30, 2008, pp. 411-420, 2008, ACM, 978-1-60558-073-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
sensor networks, algorithm, coverage |
35 | Jörg Drechsler, Jerome P. Reiter |
Accounting for Intruder Uncertainty Due to Sampling When Estimating Identification Disclosure Risks in Partially Synthetic Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, pp. 227-238, 2008, Springer, 978-3-540-87470-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Risk, CART, Disclosure, Synthetic data |
35 | Boting Yang, Yi Cao |
Monotonicity of strong searching on digraphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comb. Optim. ![In: J. Comb. Optim. 14(4), pp. 411-425, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cops-and-robber game, Pursuit-and-evasion problem, NP-complete, Monotonicity, Graph searching, Digraph |
35 | Jeffrey V. Nickerson, Stephan Olariu |
Protecting with Sensor Networks: Attention and Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 294, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Boting Yang, Yi Cao |
Digraph Strong Searching: Monotonicity and Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAIM ![In: Algorithmic Aspects in Information and Management, Third International Conference, AAIM 2007, Portland, OR, USA, June 6-8, 2007, Proceedings, pp. 37-46, 2007, Springer, 978-3-540-72868-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Satoshi Kawabata, Shinsaku Hiura, Kosuke Sato |
Real-Time Detection of Anomalous Objects in Dynamic Scene. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (3) ![In: 18th International Conference on Pattern Recognition (ICPR 2006), 20-24 August 2006, Hong Kong, China, pp. 1171-1174, 2006, IEEE Computer Society, 0-7695-2521-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Ajith Abraham, Ravi Jain |
Soft Computing Models for Network Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Classification and Clustering for Knowledge Discovery ![In: Classification and Clustering for Knowledge Discovery, pp. 191-207, 2005, Springer, 978-3-540-26073-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Victor C. S. Lee, John A. Stankovic, Sang Hyuk Son |
Intrusion Detection in Real-Time Database Systems via Time Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Real Time Technology and Applications Symposium ![In: Proceedings of the Sixth IEEE Real Time Technology and Applications Symposium, RTAS 2000, Washington, DC, USA, May 31 - June 2, 2000, pp. 124-133, 2000, IEEE Computer Society, 0-7695-0713-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
time signature, performance evaluation, intrusion detection, real-time database systems |
34 | Vito Di Gesù, Giosuè Lo Bosco, Jerome H. Friedman |
Intruders pattern identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 19th International Conference on Pattern Recognition (ICPR 2008), December 8-11, 2008, Tampa, Florida, USA, pp. 1-4, 2008, IEEE Computer Society, 978-1-4244-2175-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, T. J. Jankun-Kelly |
Detecting Flaws and Intruders with Visual Data Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Computer Graphics and Applications ![In: IEEE Computer Graphics and Applications 24(5), pp. 27-35, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Donald Stanley, Boting Yang |
Lower Bounds on Fast Searching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 20th International Symposium, ISAAC 2009, Honolulu, Hawaii, USA, December 16-18, 2009. Proceedings, pp. 964-973, 2009, Springer, 978-3-642-10630-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Chih-Yung Chang, Li-Ling Hung, Yu-Chieh Chen, Ming-Hsien Li |
On-supporting energy balanced k-barrier coverage in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 274-278, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, distributed, barrier coverage |
23 | Ashish Kamra, Evimaria Terzi, Elisa Bertino |
Detecting anomalous access patterns in relational databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 17(5), pp. 1063-1077, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection, Anomaly detection, RBAC, DBMS, User profiles |
23 | YuanYuan Li, Lynne E. Parker |
Detecting and monitoring time-related abnormal events using a wireless sensor network and mobile robot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, September 22-26, 2008, Acropolis Convention Center, Nice, France, pp. 3292-3298, 2008, IEEE, 978-1-4244-2057-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Jill K. Nelson, Errol G. Rowe, G. Clifford Carter |
Detection capabilities of randomly-deployed underwater sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2008, March 30 - April 4, 2008, Caesars Palace, Las Vegas, Nevada, USA, pp. 1493-1496, 2008, IEEE, 1-4244-1484-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Zhengdao Zhang, Zhumiao Peng, Zhiping Zhou |
The Study of Intrusion Prediction Based on HsMM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1358-1363, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Volkan Ustun, Jeffrey S. Smith |
Mental simulation for creating realistic behavior in physical security systems simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 2008 Winter Simulation Conference, Global Gateway to Discovery, WSC 2008, InterContinental Hotel, Miami, Florida, USA, December 7-10, 2008, pp. 879-885, 2008, WSC, 978-1-4244-2708-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Jianhua Yang, Byong Lee |
Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 2-12, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Erdal Cayirci |
Sensor Network Applications Implemented by Industry and Their Security Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 1, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Binay K. Bhattacharya, Mike Burmester, Yuzhuang Hu, Evangelos Kranakis, Qiaosheng Shi, Andreas Wiese |
Optimal Movement of Mobile Sensors for Barrier Coverage of a Planar Region. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COCOA ![In: Combinatorial Optimization and Applications, Second International Conference, COCOA 2008, St. John's, NL, Canada, August 21-24, 2008. Proceedings, pp. 103-115, 2008, Springer, 978-3-540-85096-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Emmanuel Velasco, Weifeng Chen 0001, Ping Ji 0002, Raymond Hsieh |
Wireless Forensic: A New Radio Frequency Based Locating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 272-277, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Patrick P. C. Lee, Vishal Misra, Dan Rubenstein |
Distributed algorithms for secure multipath routing in attack-resistant networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 15(6), pp. 1490-1501, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
attack-resistant networks, preflow-push, security, optimization, resilience, multipath routing, maximum-flow problems |
23 | Brian Alspach, Danny Dyer, Denis Hanson, Boting Yang |
Lower Bounds on Edge Searching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESCAPE ![In: Combinatorics, Algorithms, Probabilistic and Experimental Methodologies, First International Symposium, ESCAPE 2007, Hangzhou, China, April 7-9, 2007, Revised Selected Papers, pp. 516-527, 2007, Springer, 978-3-540-74449-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Grant Cermak, Karl Keyzer |
Unsupervised Intrusion Detection Using Color Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVC (2) ![In: Advances in Visual Computing, Third International Symposium, ISVC 2007, Lake Tahoe, NV, USA, November 26-28, 2007, Proceedings, Part II, pp. 770-780, 2007, Springer, 978-3-540-76855-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Xiaojun Ye, Zude Li, Yongnian Li |
Capture Inference Attacks for K-Anonymity with Privacy Inference Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Advances in Databases: Concepts, Systems and Applications, 12th International Conference on Database Systems for Advanced Applications, DASFAA 2007, Bangkok, Thailand, April 9-12, 2007, Proceedings, pp. 676-687, 2007, Springer, 978-3-540-71702-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
Stepping-stone detection algorithm based on order preserving mapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 13th International Conference on Parallel and Distributed Systems, ICPADS 2007, Hsinchu, Taiwan, December 5-7, 2007, pp. 1-8, 2007, IEEE Computer Society, 978-1-4244-1889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Sergio de Oliveira, Hao Chi Wong, José Marcos S. Nogueira |
NEKAP: Intruder Resilient and Energy Efficient Key Establishment in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 16th International Conference on Computer Communications and Networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007, pp. 803-808, 2007, IEEE, 978-1-4244-1251-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang |
HonIDS: Enhancing Honeypot System with Intrusion Detection Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 135-143, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | John Z. Zhang, Tsunehiko Kameda |
Where to Build a Door. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2006, October 9-15, 2006, Beijing, China, pp. 4084-4090, 2006, IEEE, 1-4244-0258-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Giovanni Di Crescenzo, Richard J. Lipton, Shabsi Walfish |
Perfectly Secure Password Protocols in the Bounded Retrieval Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 225-244, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Siu Fung Yeung, John C. S. Lui, David K. Y. Yau |
A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 7(2), pp. 330-338, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Santosh Kumar 0001, Ten-Hwang Lai, Anish Arora |
Barrier coverage with wireless sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the 11th Annual International Conference on Mobile Computing and Networking, MOBICOM 2005, Cologne, Germany, August 28 - September 2, 2005, pp. 284-298, 2005, ACM, 1-59593-020-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
critical conditions, wireless sensor networks, coverage, network topology, localized algorithms, random geometric graphs, barrier coverage |
23 | Nan Zhang 0003, Mark Ryan 0001, Dimitar P. Guelev |
Evaluating Access Control Policies Through Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 446-460, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control policy language, model checking, verification, access control, access control model, access control policy |
23 | Patrick P. C. Lee, Vishal Misra, Dan Rubenstein |
Distributed algorithms for secure multipath routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 1952-1963, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athena Vakali |
Intrusion Detection in RBAC-administered Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 170-182, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Dongxi Liu, Chi-Hung Chi, Ming Li 0002 |
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 37th Annual Simulation Symposium (ANSS-37 2004), 18-22 April 2004, Arlington, VA, USA, pp. 293-299, 2004, IEEE Computer Society, 0-7695-2110-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Jianguo Ding, Shihao Xu, Bernd J. Krämer, Yingcai Bai, Hansheng Chen 0003, Jun Zhang |
Probabilistic Inference Strategy in Distributed Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, Second InternationalSymposium, ISPA 2004, Hong Kong, China, December 13-15, 2004, Proceedings, pp. 835-844, 2004, Springer, 3-540-24128-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Bill McCarty |
Automated Identity Theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(5), pp. 89-92, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC |
23 | Jing Deng 0002, Richard Han 0001, Shivakant Mishra |
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Information Processing in Sensor Networks, Second International Workshop, IPSN 2003, Palo Alto, CA, USA, April 22-23, 2003, Proceedings, pp. 349-364, 2003, Springer, 3-540-02111-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Robert H. Deng, Jianying Zhou 0001, Feng Bao 0001 |
Defending against redirect attacks in mobile IP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 59-67, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
mobile IP security, redirect attack, secure binding update, mobile IP, authenticated key-exchange |
23 | Siu Fung Yeung, John C. S. Lui, David K. Y. Yau |
A case for a multi-key secure video proxy: theory, design, and implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 10th ACM International Conference on Multimedia 2002, Juan les Pins, France, December 1-6, 2002., pp. 392-401, 2002, ACM, 1-58113-620-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
asymmetric parametric sequence functions, multi-key RSA, video proxy, security |
23 | Heejin Jang, Sangwook Kim |
An intruder tracing system based on a shadowing mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy, pp. 904-909, 2002, IEEE Computer Society, 0-7695-1671-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Heejin Jang, Sangwook Kim |
Real-Time Intruder Tracing through Self-Replication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 1-16, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Juan José Salazar González |
Extending Cell Suppression to Protect Tabular Data against Several Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inference Control in Statistical Databases ![In: Inference Control in Statistical Databases, From Theory to Practice, pp. 34-58, 2002, Springer, 3-540-43614-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Richard C. Linger |
Systematic Generation of Stochastic Diversity as an Intrusion Barrier in Survivable Systems Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, USA, 1999, IEEE Computer Society, 0-7695-0001-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
22 | Arman Pourghorban, Dipankar Maity |
Target Defense against Periodically Arriving Intruders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.05577, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Shridhar Velhal, Suresh Sundaram 0002, Narasimhan Sundararajan |
Priority-based DREAM Approach for Highly Manoeuvring Intruders in A Perimeter Defense Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.09954, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Ali Moltajaei Farid, Mei Kuan Lim, Md. Abdus Samad Kamal, Koksheik Wong |
Effective UAV patrolling for swarm of intruders with heterogeneous behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotica ![In: Robotica 41(6), pp. 1673-1688, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Ahmad Elleathy, Faris Alhumaidan, Mohammed Alqahtani, Ahmed Almaiman, Amr M. Ragheb, Ahmed B. Ibrahim, Jameel Ali, Maged Abdullah Esmail, Saleh A. Alshebeili |
Strain FBG-Based Sensor for Detecting Fence Intruders Using Machine Learning and Adaptive Thresholding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(11), pp. 5015, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Najeeb Al-Khalli, Saud Alateeq, Mohammed Almansour, Yousef AlHassoun, Ahmed B. Ibrahim, Saleh A. Alshebeili |
Real-Time Detection of Intruders Using an Acoustic Sensor and Internet-of-Things Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(13), pp. 5792, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Jinpeng Han, Xiaoguang Chen, Manzhi Yang, Rouxing Huai |
PatrolGo: Efficient Security Patrol Route Planning to Catch Intruders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DTPI ![In: IEEE 3rd International Conference on Digital Twins and Parallel Intelligence, DTPI 2023, Orlando, FL, USA, November 7-9, 2023, pp. 1-4, 2023, IEEE, 979-8-3503-1847-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Arman Pourghorban, Dipankar Maity |
Target Defense against Periodically Arriving Intruders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACC ![In: American Control Conference, ACC 2023, San Diego, CA, USA, May 31 - June 2, 2023, pp. 1673-1679, 2023, IEEE, 979-8-3503-2806-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Richa Sharma, Teek Parval Sharma, Ajay Kumar Sharma |
Detecting and Preventing Misbehaving Intruders in the Internet of Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cloud Appl. Comput. ![In: Int. J. Cloud Appl. Comput. 12(1), pp. 1-21, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Matteo Santilli, Mauro Franceschelli, Andrea Gasparri |
Secure rendezvous and static containment in multi-agent systems with adversarial intruders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. ![In: Autom. 143, pp. 110456, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Arman Pourghorban, Michael R. Dorothy, Daigo Shishika, Alexander Von Moll, Dipankar Maity |
Target Defense against Sequentially Arriving Intruders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.06628, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Harsh Namdev Bhor, Mukesh Kalla |
TRUST-based features for detecting the intruders in the Internet of Things network using deep learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Intell. ![In: Comput. Intell. 38(2), pp. 438-462, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Arman Pourghorban, Michael R. Dorothy, Daigo Shishika, Alexander Von Moll, Dipankar Maity |
Target Defense against Sequentially Arriving Intruders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: 61st IEEE Conference on Decision and Control, CDC 2022, Cancun, Mexico, December 6-9, 2022, pp. 6594-6601, 2022, IEEE, 978-1-6654-6761-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Neilly H. Tan, Richmond Y. Wong, Audrey Desjardins, Sean A. Munson, James Pierce |
Monitoring Pets, Deterring Intruders, and Casually Spying on Neighbors: Everyday Uses of Smart Home Cameras. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022, pp. 617:1-617:25, 2022, ACM, 978-1-4503-9157-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Claudio Cimarelli |
Perception for Surveillance: Learning Self-localisation and Intruders Detection from Monocular Images of an Aerial robot in Outdoor Urban Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
22 | David Petrizze, Kasra Koorehdavoudi, Mengran Xue, Sandip Roy 0002 |
Distinguishing Aerial Intruders from Trajectory Data: A Model-Based Hypothesis-Testing Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2105.07505, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
22 | Ali Marzoughi, Andrey V. Savkin |
Autonomous Navigation of a Team of Unmanned Surface Vehicles for Intercepting Intruders on a Region Boundary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 21(1), pp. 297, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | David Petrizze, Kasra Koorehdavoudi, Mengran Xue, Sandip Roy 0002 |
Distinguishing Aerial Intruders from Trajectory Data: A Model-Based Hypothesis-Testing Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACC ![In: 2021 American Control Conference, ACC 2021, New Orleans, LA, USA, May 25-28, 2021, pp. 3951-3956, 2021, IEEE, 978-1-6654-4197-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Péter Bauer |
Applicability of Different Mono Camera-based Aircraft Sense and Avoid Methods for Steady and Linear Path Intruders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MED ![In: 29th Mediterranean Conference on Control and Automation, MED 2021, Bari, Italy, June 22-25, 2021, pp. 138-143, 2021, IEEE, 978-1-6654-2258-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Zhadyra Avkurova, Sergiy Gnatyuk, Bayan Abduraimova, Solomiia Fedushko, Yuriy Syerov, Olha Trach |
Models for early web-attacks detection and intruders identification based on fuzzy logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSPN/ICTH ![In: The 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2021) / The 11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2021), Leuven, Belgium, November 1-4, 2021., pp. 694-699, 2021, Elsevier. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Yevhen Vasiliu, Tetiana Okhrimenko, Andriy Fesenko, Sergiy Dorozhynskyy |
Passive Eavesdropping Attack of Several Intruders on Deterministic Protocol with Pairs of Entangled Qubits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDAACS ![In: 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland, September 22-25, 2021, pp. 1068-1072, 2021, IEEE, 978-1-6654-4209-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Wenming Wang, Haiping Huang, Qi Li 0011, Fan He, Chao Sha |
Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 25170-25183, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Deepak Kumar Verma, Ashwani Kush, Renu Jain |
Identifying Intruders in MANET: Exploiting RREP Message of AODV Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Technol. Proj. Manag. ![In: Int. J. Inf. Technol. Proj. Manag. 11(4), pp. 42-55, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Muhammad Usman Arif |
Decentralized decision making and navigation strategy for tracking intruders in a cluttered area by a group of mobile robots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.07518, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Caitao Zhan, Himanshu Gupta 0001, Arani Bhattacharya, Mohammad Ghaderibaneh |
Efficient Localization of Multiple Intruders in Shared Spectrum System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: 19th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2020, Sydney, Australia, April 21-24, 2020, pp. 205-216, 2020, IEEE, 978-1-7281-5497-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Tadashi Shoji, Munehiro Takimoto, Yasushi Kambayashi |
Capture of Multi Intruders by Cooperative Multiple Robots using Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAART (1) ![In: Proceedings of the 12th International Conference on Agents and Artificial Intelligence, ICAART 2020, Volume 1, Valletta, Malta, February 22-24, 2020., pp. 370-377, 2020, SCITEPRESS, 978-989-758-395-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Yasushi Kambayashi, Taichi Sekido, Munehiro Takimoto |
Capture of Intruders by Cooperative Multiple Robots Using Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IHSI ![In: Intelligent Human Systems Integration 2020 - Proceedings of the 3rd International Conference on Intelligent Human Systems Integration (IHSI 2020): Integrating People and Intelligent Systems, February 19-21, 2020, Modena, Italy, pp. 1041-1047, 2020, Springer, 978-3-030-39511-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Daigo Shishika, Derek A. Paley |
Mosquito-inspired distributed swarming and pursuit for cooperative defense against fast intruders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Auton. Robots ![In: Auton. Robots 43(7), pp. 1781-1799, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Bo Lei, Yao Zhang 0008, Yixin Yang 0001 |
Detection of Sound Field Aberrations Caused by Forward Scattering From Underwater Intruders Using Unsupervised Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 17608-17616, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | N. Bhalaji 0001, S. Venkatesh |
Enhanced analysis of border surveillance using intruders' crossing strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 23(21), pp. 10623-10634, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | C. Pavan Kumar 0001, R. Selvakumar 0001 |
Mitigating the interferences and intruders in cognitive radio networks using an authentication protocol over Reed-Solomon codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Distributed Syst. ![In: Int. J. Commun. Networks Distributed Syst. 23(4), pp. 522-538, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Abraão Aires Urquiza, Musab A. AlTurki, Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott |
Resource-Bounded Intruders in Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 32nd IEEE Computer Security Foundations Symposium, CSF 2019, Hoboken, NJ, USA, June 25-28, 2019, pp. 382-396, 2019, IEEE, 978-1-7281-1407-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Shou-Hsuan Stephen Huang, Zechun Cao, Calvin E. Raines, Mai N. Yang, Camille Simon 0002 |
Detecting Intruders by User File Access Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings, pp. 320-335, 2019, Springer, 978-3-030-36937-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Haiping Huang, Tianhe Gong, Rong Zhang 0001, Lie-Liang Yang, Jiancong Zhang, Fu Xiao 0001 |
Intrusion Detection Based on k-Coverage in Mobile Sensor Networks With Empowered Intruders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 67(12), pp. 12109-12123, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | T. D. Ovasapyan, Dmitry A. Moskvin, Maxim O. Kalinin |
Using Neural Networks to Detect Internal Intruders in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. Control. Comput. Sci. ![In: Autom. Control. Comput. Sci. 52(8), pp. 954-958, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Guillermo J. Laguna, Sourabh Bhattacharya |
Tracking Mobile Intruders in an Art Gallery: Guard Deployment Strategies, Fundamental Limitations, and Performance Guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1807.08350, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
22 | Pramuditha Perera, Vishal M. Patel 0001 |
Efficient and Low Latency Detection of Intruders in Mobile Active Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 13(6), pp. 1392-1405, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Kazuki Kajita, Eiji Konaka |
Hard-to-predict routing algorithm from intruders for autonomous surveillance robots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IECON ![In: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC, USA, October 21-23, 2018, pp. 2540-2545, 2018, IEEE, 978-1-5090-6684-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Zechun Cao, Shou-Hsuan Stephen Huang |
Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/BigDataSE ![In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018, pp. 475-480, 2018, IEEE, 978-1-5386-4388-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Jyoti Neeli, N. K. Cauvery |
Framework for Capturing the Intruders in Wireless Adhoc Network Using Zombie Node. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSOC (3) ![In: Cybernetics and Algorithms in Intelligent Systems - Proceedings of 7th Computer Science On-line Conference 2018, Volume 3, pp. 346-355, 2018, Springer, 978-3-319-91191-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Hichem Sedjelmaci, Sidi Mohammed Senouci, Tarek Bouali |
Predict and prevent from misbehaving intruders in heterogeneous vehicular networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Veh. Commun. ![In: Veh. Commun. 10, pp. 74-83, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul, Congduc Pham |
Low Cost Monitoring and Intruders Detection using Wireless Video Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1702.02516, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
22 | Corine M. Laan, Tom van der Mijden, Ana Isabel Barros, Richard J. Boucherie, Herman Monsuur |
An interdiction game on a queueing network with multiple intruders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Oper. Res. ![In: Eur. J. Oper. Res. 260(3), pp. 1069-1080, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Awais Yousaf, Asim Loan, Radu F. Babiceanu, Leandros A. Maglaras, Onaiza Yousaf |
Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 70, pp. 124-143, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Hamza Attak, Marco Casassa Mont, Cristian Dávila, Eleni-Constantina Davri, Carolina Fernandez, Georgios Gardikis, Bernat Gastón, Ludovic Jacquin, Antonio Lioy, Antonis Litke, Nikolaos K. Papadakis, Dimitris Papadopoulos, Jerónimo Núñez, Eleni Trouva |
SHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Security in SDN and NFV ![In: Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications, pp. 197-225, 2017, Springer, 978-3-319-64652-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Georges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali |
How Web Services Can Be Tolerant to Intruders through Diversification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2017 IEEE International Conference on Web Services, ICWS 2017, Honolulu, HI, USA, June 25-30, 2017, pp. 436-443, 2017, IEEE, 978-1-5386-0752-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Andrey V. Savkin, Ali Marzoughi |
Distributed control of a robotic network for protection of a region from intruders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ROBIO ![In: 2017 IEEE International Conference on Robotics and Biomimetics, ROBIO 2017, Macau, China, December 5-8, 2017, pp. 804-808, 2017, IEEE, 978-1-5386-3742-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Mohammad J. Abdel-Rahman, Dima Abu-Aysheh, Ahmad I. Abu-El-Haija, Rasheed J. Abu-Aysheh, Hazem M. Al-Najjar |
Detecting Intruders by Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ad Hoc Sens. Wirel. Networks ![In: Ad Hoc Sens. Wirel. Networks 31(1-4), pp. 303-337, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Yun Wang, William Chu, Sarah Fields, Colleen Heinemann, Zach Reiter |
Detection of Intelligent Intruders in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 8(1), pp. 2, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Josep Domingo-Ferrer, Krishnamurty Muralidhar |
New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 337-338, pp. 11-24, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|