|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3828 occurrences of 1280 keywords
|
|
|
Results
Found 13052 publication records. Showing 13052 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
83 | Young U. Ryu, Hyeun-Suk Rhee |
Evaluation of Intrusion Detection Systems Under a Resource Constraint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 11(4), pp. 20:1-20:24, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
optimal inspection rates, optimal operating points, intrusion detection, Computer security |
76 | Zhuowei Li 0001, Amitabha Das, Jianying Zhou 0001 |
Model Generalization and Its Implications on Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 222-237, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Security, Machine Learning, Intrusion Detection, Generalization, Intrusion, Security Infrastructure |
72 | Yoshinori Okazaki, Izuru Sato, Shigeki Goto |
A New Intrusion Detection Method based on Process Profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January - 1 February 2002, Nara City, Japan, Proceedings, pp. 82-91, 2002, IEEE Computer Society, 0-7695-1447-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
MID, DP matching m, Intrusion Detection, Profile, IDS, AID |
69 | Luigi Coppolino, Salvatore D'Antonio, Ivano Alessandro Elia, Luigi Romano |
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEUS ![In: Software Technologies for Embedded and Ubiquitous Systems, 7th IFIP WG 10.2 International Workshop, SEUS 2009, Newport Beach, CA, USA, November 16-18, 2009, Proceedings, pp. 192-202, 2009, Springer, 978-3-642-10264-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Intrusion Detection and Diagnosis, Information Diversity, Stealthy and non-vulnerability attacks, Ontologies |
68 | Moon Sun Shin, Kyeong Ja Jeong |
An Alert Data Mining Framework for Network-Based Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 38-53, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Hervé Debar, Andreas Wespi |
Aggregation and Correlation of Intrusion-Detection Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings, pp. 85-103, 2001, Springer, 3-540-42702-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
alert aggregation, alert data model, Intrusion detection, alert correlation |
65 | Guiling Zhang, Jizhou Sun |
A Novel Network Intrusion Attempts Prediction Model Based on Fuzzy Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (1) ![In: Computational Science - ICCS 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part I, pp. 419-426, 2006, Springer, 3-540-34379-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Intrusion Attempt Prediction, Intrusion Detection, Fuzzy Neural Network |
61 | Steven R. Johnston |
The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings, pp. 150-171, 2001, Springer, 3-540-42702-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
trans-border data flow, intrusion detection. (c) Her Majesty the Queen as represented by the Minister of National Defence, acting on behalf of the Communications Security Establishment, 2001, Privacy, data protection, personal information, personal data, Canada |
61 | Giovanni Vigna, Richard A. Kemmerer, Per Blix |
Designing a Web of Highly-Configurable Intrusion Detection Sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings, pp. 69-84, 2001, Springer, 3-540-42702-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
STAT, Security, Software Engineering, Intrusion Detection |
60 | Jie Zeng, Tao Li 0016, Guiyang Li, Haibo Li 0003 |
A New Intrusion Detection Method Based on Antibody Concentration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 5th International Conference on Intelligent Computing, ICIC 2009, Ulsan, South Korea, September 16-19, 2009, Proceedings, pp. 500-509, 2009, Springer, 978-3-642-04019-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Antibody concentration, Antigen intrusion intensity, Antigen-antibody reactions, Intrusion detection, False alarm rate, Detection rate |
58 | Robert Gavin Goss, Martin Botha, Rossouw von Solms |
Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAICSIT ![In: Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, SAICSIT 2007, Port Elizabeth, South Africa, October 2-3, 2007, pp. 29-35, 2007, ACM, 978-1-59593-775-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
NeGPAIM-W, wireless intrusion detection, intrusion detection, wireless LAN, information technology, information security, computer security, intrusion detection system |
58 | Simon P. Chung, Aloysius K. Mok |
On Random-Inspection-Based Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pp. 165-184, 2005, Springer, 3-540-31778-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
random inspection, intrusion detection, computer security, Mimicry attacks |
57 | Shaohua Teng, Wei Zhang 0005, Xiufen Fu, Wenwei Tan |
Cooperative intrusion detection model based on scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2007, April 26-28, 2007, Melbourne, Australia, pp. 876-881, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
57 | Jianhua Sun 0002, Hai Jin 0001, Hao Chen 0002, Qian Zhang, Zongfen Han |
A Compound Intrusion Detection Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 370-381, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
56 | Liwei Kuang, Mohammad Zulkernine |
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 319-326, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection systems, Intrusion-tolerance |
56 | Michael E. Locasto, Ke Wang 0009, Angelos D. Keromytis, Salvatore J. Stolfo |
FLIPS: Hybrid Adaptive Intrusion Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pp. 82-101, 2005, Springer, 3-540-31778-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Adaptive Response, Intrusion Tolerance, Intrusion Prevention |
56 | Joachim Biskup, Ulrich Flegel |
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings, pp. 28-48, 2000, Springer, 3-540-41085-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
audit analysis, purpose binding, privacy, intrusion detection, anonymity, secret sharing, pseudonymity |
56 | Andreas Wespi, Marc Dacier, Hervé Debar |
Intrusion Detection Using Variable-Length Audit Trail Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings, pp. 110-129, 2000, Springer, 3-540-41085-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Teiresias, variable-length patterns, C2 audit trail, functionality verification tests, Intrusion detection, pattern matching, pattern discovery |
56 | Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric |
Measuring intrusion detection capability: an information-theoretic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 90-101, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
information-theoretic, intrusion detection, performance measurement |
56 | Dong Seong Kim 0001, Sang Min Lee 0018, Jong Sou Park |
Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, ISPA 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento, Italy, December 4-7, 2006, Proceedings, pp. 981-989, 2006, Springer, 3-540-49860-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Data mining, Intrusion Detection System, Random Forest |
56 | Darren Mutz, Giovanni Vigna, Richard A. Kemmerer |
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 374-383, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Software Testing, Intrusion Detection, Traffic Generation, Evasion Attacks |
56 | Peng Ning, Yun Cui, Douglas S. Reeves |
Constructing attack scenarios through correlation of intrusion alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 245-254, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
intrusion detection, alert correlation, attack scenarios |
54 | Hong Han 0003, Xianliang Lu, Jun Lu, Bo Chen, Ren Li Yong |
Data mining aided signature discovery in network-based intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 36(4), pp. 7-13, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
network-based intrusion detection, signature discovery, data mining, intrusion detection system |
54 | Kofi Nyarko, Tanya Capers, Craig Scott, Kemi Ladeji-Osias |
Network Intrusion Visualization with NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems ![In: 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, HAPTICS 2002, Orlando, Florida, USA, March 24-25, 2002, Proceedings, pp. 277-284, 2002, IEEE Computer Society, 0-7695-1489-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
54 | Magnus Almgren, Ulf Lindqvist |
Application-Integrated Data Collection for Security Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings, pp. 22-36, 2001, Springer, 3-540-42702-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Intrusion detection, application, Web server, module, application-integrated, Apache |
52 | Yaping Jiang, Yong Gan, Jianhua Zhou, Zengyu Cai |
A Model of Intrusion Prevention Base on Immune. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 441-444, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Di Yao, Dan Feng 0001 |
Intrusion Detection for Object-Based Storage System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 218-222, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Byung kwan Lee, Seung Hae Yang, Dong-Hyuck Kwon, Dai-Youn Kim |
PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 38-47, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Byung-Joo Kim, Il Kon Kim |
Two-Tier Based Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (2) ![In: Fuzzy Systems and Knowledge Discovery, Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II, pp. 581-591, 2005, Springer, 3-540-28331-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade |
Towards a Theory of Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 267-286, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Zhuowei Li 0001, Amitabha Das |
Visualizing and Identifying Intrusion Context from System Calls Trace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 61-70, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Marc Dacier, O. Sami Saydjari |
Special Seminar: Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTCS ![In: Digest of Papers: FTCS-29, The Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing, Madison, Wisconsin, USA, June 15-18, 1999, pp. 238, 1999, IEEE Computer Society, 0-7695-0213-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
50 | Junfeng Tian, Tao Liu, Hongqiang Jiao |
Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 592-598, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
evaluation, network security, intrusion detection system, fuzzy comprehensive evaluation |
50 | A. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff |
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 217-228, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
personal IDS, smart card, Intrusion Detection System, IDS, behavioural analysis |
50 | Shaohua Teng, Wei Zhang 0005, Xiufen Fu, Naiqi Wu |
Cooperative Intrusion Detection Model Based on State Transition Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (Selected Papers) ![In: Computer Supported Cooperative Work in Design IV, 11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers, pp. 419-431, 2007, Springer, 978-3-540-92718-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cooperative intrusion detection, Isomorphic transformation, Crucial operation, Scenario, State transition, Topological order |
50 | Gil-Han Kim, Hyung-Woo Lee |
SVM Based False Alarm Minimization Scheme on Intrusion Prevention System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (5) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V, pp. 284-293, 2006, Springer, 3-540-34079-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Intrusion Detection/Prevention, Network Security.1, False Alarm, Multi-class SVM |
50 | Noria Foukia |
IDReAM: intrusion detection and response executed with agent mobility architecture and implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), July 25-29, 2005, Utrecht, The Netherlands, pp. 264-270, 2005, ACM, 1-59593-094-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
intrusion detection and response, mobile agents |
50 | Xinyuan Wang |
The loop fallacy and serialization in tracing intrusion connections through stepping stones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 404-411, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
intrusion tracing, correlation, serialization, stepping stones |
50 | Geetha Ramachandran, Delbert Hart |
A P2P intrusion detection system based on mobile agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004, pp. 185-190, 2004, ACM, 1-58113-870-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
mobile agents, intrusion detection |
50 | Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 |
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 63-75, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Intrusion detection, Network security, Data visualization, Multivariate data analysis |
50 | Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer |
Designing and implementing a family of intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC / SIGSOFT FSE ![In: Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, ESEC/FSE 2003, Helsinki, Finland, September 1-5, 2003, pp. 88-97, 2003, ACM, 978-1-58113-743-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, intrusion detection, object-oriented frameworks, program families |
50 | Stefan Axelsson |
The base-rate fallacy and the difficulty of intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 3(3), pp. 186-205, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
base-rate fallacy, intrusion detection, false alarm rate, detection rate |
49 | Balaji Rajendran, Dnyanesh Pawar |
An intelligent contextual support system for intrusion detection tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHIMIT ![In: Proceedings of the 3rd ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT 2009, Baltimore, Maryland, USA, November 7-8, 2009, 2009, ACM, 978-1-60558-572-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
contextual support system, intelligent contextual support systems, network security engineer, network security system, intrusion detection, intrusion detection system |
49 | Bazara I. A. Barry |
Intrusion detection with OMNeT++. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SimuTools ![In: Proceedings of the 2nd International Conference on Simulation Tools and Techniques for Communications, Networks and Systems, SimuTools 2009, Rome, Italy, March 2-6, 2009, pp. 5, 2009, ICST/ACM, 978-963-9799-45-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intrusion simulation, performance evaluation, intrusion detection, OMNeT++ |
49 | Hai Jin 0001, Guofu Xiang, Feng Zhao 0003, Deqing Zou, Min Li, Lei Shi |
VMFence: a customized intrusion prevention system in distributed virtual computing environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 391-399, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
virtual computing platform, distributed system, intrusion detection, network security, virtualization, intrusion prevention |
49 | José M. González, Vern Paxson, Nicholas Weaver |
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 139-149, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
nips, fpga, intrusion detection, hardware acceleration, intrusion prevention, nids |
49 | P. Ramasubramanian, Arputharaj Kannan |
A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 10(8), pp. 699-714, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Database anomaly intrusion prediction, Genetic algorithms, Artificial neural networks, Database security, Intrusion prevention |
49 | Wanqing Wu, Madalene Spezialetti, Rajiv Gupta 0001 |
A Protocol for Removing Communication Intrusion in Monitored Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: Proceedings of the 18th International Conference on Distributed Computing Systems, Amsterdam, The Netherlands, May 26-29, 1998, pp. 120-129, 1998, IEEE Computer Society, 0-8186-8292-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
intrusion removal, distributed systems, monitoring, tools, communication protocols, intrusion |
48 | Myung-Kyu Yi, Chong-Sun Hwang |
A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part IV, pp. 584-593, 2004, Springer, 3-540-22060-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
48 | John McHugh |
Intrusion and intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 1(1), pp. 14-35, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
48 | Robert K. Cunningham, Craig S. Stevenson |
Accurately Detecting Source Code of Attacks That Increase Privilege. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings, pp. 104-116, 2001, Springer, 3-540-42702-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Machine Learning, Intrusion Detection, Malicious Code |
47 | Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt |
A Specification-Based Intrusion Detection Model for OLSR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pp. 330-350, 2005, Springer, 3-540-31778-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Specification based IDS, MANET, Mobile ad hoc network, Intrusion Detection, Network Security, Constraints, OLSR |
47 | Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt |
Formal Reasoning About Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 278-295, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
verification, formal method, Intrusion detection, security policy |
47 | Richard Lippmann, Seth E. Webster, Douglas Stetson |
The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 307-326, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Internet, network, Intrusion detection, DoS, attack, signature, worm, scan, vulnerability, probe, patch, exploit, false alarm |
47 | Peng Ning, Yun Cui, Douglas S. Reeves |
Analyzing Intensive Intrusion Alerts via Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 74-94, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Attack Scenario Analysis, Intrusion Detection, Alert Correlation |
46 | Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Karl N. Levitt |
System Health and Intrusion Monitoring Using a Hierarchy of Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings, pp. 190-204, 2001, Springer, 3-540-42702-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Prem Uppuluri, R. Sekar 0001 |
Experiences with Specification-Based Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings, pp. 172-189, 2001, Springer, 3-540-42702-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Marc G. Welz, Andrew Hutchison |
Interfacing Trusted Applications with Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings, pp. 37-53, 2001, Springer, 3-540-42702-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Dominique Alessandri |
Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings, pp. 183-196, 2000, Springer, 3-540-41085-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
46 | Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das |
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings, pp. 162-182, 2000, Springer, 3-540-41085-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
46 | Jianjing Sun, Han Yang 0005, Jingwen Tian, Fan Wu |
Intrusion Detection Method Based on Wavelet Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 851-854, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Byung-Joo Kim, Il Kon Kim |
Improved Kernel Based Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (2) ![In: Artificial Neural Networks - ICANN 2006, 16th International Conference, Athens, Greece, September 10-14, 2006. Proceedings, Part II, pp. 863-871, 2006, Springer, 3-540-38871-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Byung-Joo Kim, Il Kon Kim |
Kernel Based Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 14-16 July 2005, Jeju Island, South Korea, pp. 13-18, 2005, IEEE Computer Society, 0-7695-2296-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Jaydip Sen, Indranil Sengupta 0001 |
Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005, Proceedings, pp. 125-131, 2005, Springer, 3-540-30999-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Richard A. Kemmerer |
Designing and implementing a family of intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), November 7-11, 2005, Long Beach, CA, USA, pp. 3, 2005, ACM, 1-58113-993-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Michael Attig, John W. Lockwood |
SIFT: Snort Intrusion Filter for TCP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hot Interconnects ![In: 13th Annual IEEE Symposium on High Performance Interconnects (HOTIC 2005), 17-19 August 2005, Stanford, CA, USA, pp. 121-127, 2005, IEEE Computer Society, 0-7695-2449-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Byung-Joo Kim, Il Kon Kim |
Machine Learning Approach to Realtime Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Conference on Artificial Intelligence ![In: AI 2005: Advances in Artificial Intelligence, 18th Australian Joint Conference on Artificial Intelligence, Sydney, Australia, December 5-9, 2005, Proceedings, pp. 153-163, 2005, Springer, 3-540-30462-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Lawrence Teo, Yuliang Zheng 0001, Gail-Joon Ahn |
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany, pp. 73-88, 2003, IEEE Computer Society, 0-7695-2019-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Intrusion Detection Force, Internet Scale, Fault Tolerance, Intrusion Detection, Information Sharing, Recovery, Survivability, Infrastructure |
45 | Jingmin Zhou, Mark R. Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop |
Modeling network intrusion detection alerts for correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(1), pp. 4, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
alert fusion, intrusion detection, capability, Alert correlation |
45 | Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark Green 0001, Miguel Ángel García-Ruíz |
Toward Sound-Assisted Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 1634-1645, 2007, Springer, 978-3-540-76835-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Intrusion detection, computer networks, multimodal interfaces, human-computer interfaces, computer forensics |
45 | Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque |
E-NIPS: An Event-Based Network Intrusion Prediction System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 37-52, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Intrusion detection and prediction, attack classes, network security |
45 | Yang Li 0002, Binxing Fang, Li Guo 0001, You Chen |
TCM-KNN Algorithm for Supervised Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 141-151, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
supervised intrusion detection, TCM-KNN algorithm, data mining, machine learning, network security, TCM |
45 | You Chen, Yang Li 0002, Xueqi Cheng, Li Guo 0001 |
Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 153-167, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
feature selection, intrusion detection, filter, hybrid, wrapper |
45 | María Bermúdez-Edo, Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro |
Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers, pp. 210-221, 2006, Springer, 3-540-69083-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Intrusion event, Network security, Assessment, IDS |
45 | Jingtao Yao 0001, Songlun Zhao, Lisa Fan |
An Enhanced Support Vector Machine Model for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSKT ![In: Rough Sets and Knowledge Technology, First International Conference, RSKT 2006, Chongqing, China, July 24-26, 2006, Proceedings, pp. 538-543, 2006, Springer, 3-540-36297-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
support vector machine, feature selection, Intrusion detection, rough sets |
45 | Yoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won |
Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 777-786, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Damage Propagation, Information Security control system (ISMS), Forecast, Intrusion, Weather Forecasting |
45 | Sanjay Rawat 0001, Ved Prakash Gulati, Arun K. Pujari |
A Fast Host-Based Intrusion Detection System Using Rough Set Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Rough Sets ![In: Transactions on Rough Sets IV, pp. 144-161, 2005, Springer, 3-540-29830-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Data mining, Intrusion Detection, Rough Set, Decision Table, Anomaly, Misuse |
45 | Pradeep Kannadiga, Mohammad Zulkernine |
DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Proceedings of the 6th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2005), May 23-25, 2005, Towson, Maryland, USA, pp. 238-245, 2005, IEEE Computer Society, 0-7695-2294-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
network security and distributed systems, mobile agents, Intrusion detection, distributed attacks |
45 | Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu |
Techniques and tools for analyzing intrusion alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(2), pp. 274-318, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Intrusion detection, security management, alert correlation |
45 | Jian Guan, Daxin Liu 0001, Tong Wang 0005 |
Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part III, pp. 706-714, 2004, Springer, 3-540-22057-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Data Mining, Intrusion Detection, Network Security, Fuzzy Sets |
45 | Xian Rao, Cun-xi Dong, Shao-quan Yang |
Statistic Learning and Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSFDGrC ![In: Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing, 9th International Conference, RSFDGrC 2003, Chongqing, China, May 26-29, 2003, Proceedings, pp. 652-659, 2003, Springer, 3-540-14040-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
statistic learning intrusion detection network security support vector machines neural network |
45 | Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi |
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 234-244, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Bayesian network based detection, Missed alarms, Intrusion detection, Event correlation, False alarms |
45 | Glenn A. Fink, Karen F. O'Donoghue, Brett L. Chappell, T. G. Turner |
A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 15-19 April 2002, Fort Lauderdale, FL, USA, CD-ROM/Abstracts Proceedings, 2002, IEEE Computer Society, 0-7695-1573-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Security, Evaluation, Real-Time, Intrusion Detection, Metrics, Distributed |
44 | Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo |
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings, pp. 49-65, 2000, Springer, 3-540-41085-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
43 | Chengpo Mu, X. J. Li, Houkuan Huang, Shengfeng Tian |
Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 35-48, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Online Risk Assessment, Alert Processing, Intrusion Response, Intrusion detection, D-S Evidence Theory |
43 | Rituparna Chaki, Nabendu Chaki |
IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIM ![In: 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2007, Elk, Poland, June 28-30, 2007, pp. 179-184, 2007, IEEE Computer Society, 0-7695-2894-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Compromise node, Internal intrusion, Phantom intrusion detection, Mobile ad hoc network, IDS |
43 | Peng Ning, Dingbang Xu |
Hypothesizing and reasoning about attacks missed by intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(4), pp. 591-627, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Intrusion alert correlation, missed attacks, intrusion detection |
43 | Tom Dunigan, Greg Hinkel |
Intrusion Detection and Intrusion Prevention on a Large Network: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Intrusion Detection and Network Monitoring ![In: Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, USA, April 9-12, 1999, pp. 11-17, 1999, USENIX, 1-880446-37-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
43 | Ambareen Siraj, Rayford B. Vaughn, Susan Bridges |
Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Kim Potter Kihlstrom, Priya Narasimhan |
The Starfish System: Providing Intrusion Detection and Intrusion Tolerance for Middleware Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORDS ![In: 8th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2003), 15-17 January 2003, Guadalajara, Mexico, pp. 191-199, 2003, IEEE Computer Society, 0-7695-1929-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Hervé Debar, Benjamin Morin |
Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 177-198, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
43 | Alfonso Valdes, Keith Skinner |
Adaptive, Model-Based Monitoring for Cyber Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings, pp. 80-92, 2000, Springer, 3-540-41085-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Innovative approaches, IDS cooperation, Bayes nets, Intrusion detection |
41 | Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis |
Gnort: High Performance Network Intrusion Detection Using Graphics Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 116-134, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
parallel programming, network security, GPU, pattern matching, intrusion detection systems, SIMD |
41 | Eric Totel, Frédéric Majorczyk, Ludovic Mé |
COTS Diversity Based Intrusion Detection and Application to Web Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pp. 43-62, 2005, Springer, 3-540-31778-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
COTS diversity, Intrusion detection, anomaly detection, design diversity |
41 | Steven R. Johnston |
Development of a Legal Framework for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 138-157, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception |
41 | Ulf Lindqvist, Erland Jonsson |
How to Systematically Classify Computer Security Intrusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 154-163, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Security, Classification, Intrusion Detection, Experiment, Computers, Taxonomy, Intrusion |
41 | Zakia Marrakchi, Ludovic Mé, Bernard Vivinis, Benjamin Morin |
Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings, pp. 130-144, 2000, Springer, 3-540-41085-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
41 | Anup K. Ghosh, Christoph C. Michael, Michael Schatz |
A Real-Time Intrusion Detection System Based on Learning Program Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings, pp. 93-109, 2000, Springer, 3-540-41085-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
41 | Chris Strasburg, Natalia Stakhanova, Samik Basu 0001, Johnny S. Wong |
A Framework for Cost Sensitive Assessment of Intrusion Response Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1, pp. 355-360, 2009, IEEE Computer Society, 978-0-7695-3726-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | I. V. M. de Lima, Joelson A. Degaspari, João Bosco M. Sobral |
Intrusion detection through artificial neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 867-870, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 13052 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|