The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for intrusion with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1991 (15) 1992-1994 (22) 1995-1996 (19) 1997 (21) 1998 (21) 1999 (101) 2000 (82) 2001 (116) 2002 (179) 2003 (304) 2004 (453) 2005 (612) 2006 (626) 2007 (603) 2008 (674) 2009 (552) 2010 (420) 2011 (377) 2012 (338) 2013 (307) 2014 (319) 2015 (323) 2016 (370) 2017 (441) 2018 (595) 2019 (702) 2020 (790) 2021 (953) 2022 (1105) 2023 (1303) 2024 (309)
Publication types (Num. hits)
article(5186) book(16) data(15) incollection(79) inproceedings(7542) phdthesis(194) proceedings(20)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3828 occurrences of 1280 keywords

Results
Found 13052 publication records. Showing 13052 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
83Young U. Ryu, Hyeun-Suk Rhee Evaluation of Intrusion Detection Systems Under a Resource Constraint. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF optimal inspection rates, optimal operating points, intrusion detection, Computer security
76Zhuowei Li 0001, Amitabha Das, Jianying Zhou 0001 Model Generalization and Its Implications on Intrusion Detection. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security, Machine Learning, Intrusion Detection, Generalization, Intrusion, Security Infrastructure
72Yoshinori Okazaki, Izuru Sato, Shigeki Goto A New Intrusion Detection Method based on Process Profiling. Search on Bibsonomy SAINT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MID, DP matching m, Intrusion Detection, Profile, IDS, AID
69Luigi Coppolino, Salvatore D'Antonio, Ivano Alessandro Elia, Luigi Romano From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach. Search on Bibsonomy SEUS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Intrusion Detection and Diagnosis, Information Diversity, Stealthy and non-vulnerability attacks, Ontologies
68Moon Sun Shin, Kyeong Ja Jeong An Alert Data Mining Framework for Network-Based Intrusion Detection System. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
67Hervé Debar, Andreas Wespi Aggregation and Correlation of Intrusion-Detection Alerts. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF alert aggregation, alert data model, Intrusion detection, alert correlation
65Guiling Zhang, Jizhou Sun A Novel Network Intrusion Attempts Prediction Model Based on Fuzzy Neural Network. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion Attempt Prediction, Intrusion Detection, Fuzzy Neural Network
61Steven R. Johnston The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF trans-border data flow, intrusion detection. (c) Her Majesty the Queen as represented by the Minister of National Defence, acting on behalf of the Communications Security Establishment, 2001, Privacy, data protection, personal information, personal data, Canada
61Giovanni Vigna, Richard A. Kemmerer, Per Blix Designing a Web of Highly-Configurable Intrusion Detection Sensors. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF STAT, Security, Software Engineering, Intrusion Detection
60Jie Zeng, Tao Li 0016, Guiyang Li, Haibo Li 0003 A New Intrusion Detection Method Based on Antibody Concentration. Search on Bibsonomy ICIC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Antibody concentration, Antigen intrusion intensity, Antigen-antibody reactions, Intrusion detection, False alarm rate, Detection rate
58Robert Gavin Goss, Martin Botha, Rossouw von Solms Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. Search on Bibsonomy SAICSIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF NeGPAIM-W, wireless intrusion detection, intrusion detection, wireless LAN, information technology, information security, computer security, intrusion detection system
58Simon P. Chung, Aloysius K. Mok On Random-Inspection-Based Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random inspection, intrusion detection, computer security, Mimicry attacks
57Shaohua Teng, Wei Zhang 0005, Xiufen Fu, Wenwei Tan Cooperative intrusion detection model based on scenario. Search on Bibsonomy CSCWD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
57Jianhua Sun 0002, Hai Jin 0001, Hao Chen 0002, Qian Zhang, Zongfen Han A Compound Intrusion Detection Model. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
56Liwei Kuang, Mohammad Zulkernine An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion detection systems, Intrusion-tolerance
56Michael E. Locasto, Ke Wang 0009, Angelos D. Keromytis, Salvatore J. Stolfo FLIPS: Hybrid Adaptive Intrusion Prevention. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Adaptive Response, Intrusion Tolerance, Intrusion Prevention
56Joachim Biskup, Ulrich Flegel Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF audit analysis, purpose binding, privacy, intrusion detection, anonymity, secret sharing, pseudonymity
56Andreas Wespi, Marc Dacier, Hervé Debar Intrusion Detection Using Variable-Length Audit Trail Patterns. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Teiresias, variable-length patterns, C2 audit trail, functionality verification tests, Intrusion detection, pattern matching, pattern discovery
56Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric Measuring intrusion detection capability: an information-theoretic approach. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information-theoretic, intrusion detection, performance measurement
56Dong Seong Kim 0001, Sang Min Lee 0018, Jong Sou Park Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data mining, Intrusion Detection System, Random Forest
56Darren Mutz, Giovanni Vigna, Richard A. Kemmerer An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Software Testing, Intrusion Detection, Traffic Generation, Evasion Attacks
56Peng Ning, Yun Cui, Douglas S. Reeves Constructing attack scenarios through correlation of intrusion alerts. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF intrusion detection, alert correlation, attack scenarios
54Hong Han 0003, Xianliang Lu, Jun Lu, Bo Chen, Ren Li Yong Data mining aided signature discovery in network-based intrusion detection system. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF network-based intrusion detection, signature discovery, data mining, intrusion detection system
54Kofi Nyarko, Tanya Capers, Craig Scott, Kemi Ladeji-Osias Network Intrusion Visualization with NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration. Search on Bibsonomy Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
54Magnus Almgren, Ulf Lindqvist Application-Integrated Data Collection for Security Monitoring. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Intrusion detection, application, Web server, module, application-integrated, Apache
52Yaping Jiang, Yong Gan, Jianhua Zhou, Zengyu Cai A Model of Intrusion Prevention Base on Immune. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
52Di Yao, Dan Feng 0001 Intrusion Detection for Object-Based Storage System. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Byung kwan Lee, Seung Hae Yang, Dong-Hyuck Kwon, Dai-Youn Kim PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Byung-Joo Kim, Il Kon Kim Two-Tier Based Intrusion Detection System. Search on Bibsonomy FSKD (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade Towards a Theory of Intrusion Detection. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Zhuowei Li 0001, Amitabha Das Visualizing and Identifying Intrusion Context from System Calls Trace. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Marc Dacier, O. Sami Saydjari Special Seminar: Intrusion Detection. Search on Bibsonomy FTCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
50Junfeng Tian, Tao Liu, Hongqiang Jiao Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF evaluation, network security, intrusion detection system, fuzzy comprehensive evaluation
50A. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF personal IDS, smart card, Intrusion Detection System, IDS, behavioural analysis
50Shaohua Teng, Wei Zhang 0005, Xiufen Fu, Naiqi Wu Cooperative Intrusion Detection Model Based on State Transition Analysis. Search on Bibsonomy CSCWD (Selected Papers) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cooperative intrusion detection, Isomorphic transformation, Crucial operation, Scenario, State transition, Topological order
50Gil-Han Kim, Hyung-Woo Lee SVM Based False Alarm Minimization Scheme on Intrusion Prevention System. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion Detection/Prevention, Network Security.1, False Alarm, Multi-class SVM
50Noria Foukia IDReAM: intrusion detection and response executed with agent mobility architecture and implementation. Search on Bibsonomy AAMAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF intrusion detection and response, mobile agents
50Xinyuan Wang The loop fallacy and serialization in tracing intrusion connections through stepping stones. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF intrusion tracing, correlation, serialization, stepping stones
50Geetha Ramachandran, Delbert Hart A P2P intrusion detection system based on mobile agents. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF mobile agents, intrusion detection
50Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion detection, Network security, Data visualization, Multivariate data analysis
50Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer Designing and implementing a family of intrusion detection systems. Search on Bibsonomy ESEC / SIGSOFT FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, intrusion detection, object-oriented frameworks, program families
50Stefan Axelsson The base-rate fallacy and the difficulty of intrusion detection. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF base-rate fallacy, intrusion detection, false alarm rate, detection rate
49Balaji Rajendran, Dnyanesh Pawar An intelligent contextual support system for intrusion detection tasks. Search on Bibsonomy CHIMIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF contextual support system, intelligent contextual support systems, network security engineer, network security system, intrusion detection, intrusion detection system
49Bazara I. A. Barry Intrusion detection with OMNeT++. Search on Bibsonomy SimuTools The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion simulation, performance evaluation, intrusion detection, OMNeT++
49Hai Jin 0001, Guofu Xiang, Feng Zhao 0003, Deqing Zou, Min Li, Lei Shi VMFence: a customized intrusion prevention system in distributed virtual computing environment. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF virtual computing platform, distributed system, intrusion detection, network security, virtualization, intrusion prevention
49José M. González, Vern Paxson, Nicholas Weaver Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF nips, fpga, intrusion detection, hardware acceleration, intrusion prevention, nids
49P. Ramasubramanian, Arputharaj Kannan A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system. Search on Bibsonomy Soft Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Database anomaly intrusion prediction, Genetic algorithms, Artificial neural networks, Database security, Intrusion prevention
49Wanqing Wu, Madalene Spezialetti, Rajiv Gupta 0001 A Protocol for Removing Communication Intrusion in Monitored Distributed Systems. Search on Bibsonomy ICDCS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF intrusion removal, distributed systems, monitoring, tools, communication protocols, intrusion
48Myung-Kyu Yi, Chong-Sun Hwang A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion Detection System. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
48John McHugh Intrusion and intrusion detection. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
48Robert K. Cunningham, Craig S. Stevenson Accurately Detecting Source Code of Attacks That Increase Privilege. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Machine Learning, Intrusion Detection, Malicious Code
47Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt A Specification-Based Intrusion Detection Model for OLSR. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Specification based IDS, MANET, Mobile ad hoc network, Intrusion Detection, Network Security, Constraints, OLSR
47Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt Formal Reasoning About Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF verification, formal method, Intrusion detection, security policy
47Richard Lippmann, Seth E. Webster, Douglas Stetson The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Internet, network, Intrusion detection, DoS, attack, signature, worm, scan, vulnerability, probe, patch, exploit, false alarm
47Peng Ning, Yun Cui, Douglas S. Reeves Analyzing Intensive Intrusion Alerts via Correlation. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Attack Scenario Analysis, Intrusion Detection, Alert Correlation
46Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Karl N. Levitt System Health and Intrusion Monitoring Using a Hierarchy of Constraints. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
46Prem Uppuluri, R. Sekar 0001 Experiences with Specification-Based Intrusion Detection. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
46Marc G. Welz, Andrew Hutchison Interfacing Trusted Applications with Intrusion Detection Systems. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
46Dominique Alessandri Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
46Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
46Jianjing Sun, Han Yang 0005, Jingwen Tian, Fan Wu Intrusion Detection Method Based on Wavelet Neural Network. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Byung-Joo Kim, Il Kon Kim Improved Kernel Based Intrusion Detection System. Search on Bibsonomy ICANN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Byung-Joo Kim, Il Kon Kim Kernel Based Intrusion Detection System. Search on Bibsonomy ACIS-ICIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Jaydip Sen, Indranil Sengupta 0001 Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Richard A. Kemmerer Designing and implementing a family of intrusion detection systems. Search on Bibsonomy ASE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Michael Attig, John W. Lockwood SIFT: Snort Intrusion Filter for TCP. Search on Bibsonomy Hot Interconnects The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Byung-Joo Kim, Il Kon Kim Machine Learning Approach to Realtime Intrusion Detection System. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Lawrence Teo, Yuliang Zheng 0001, Gail-Joon Ahn Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion Detection Force, Internet Scale, Fault Tolerance, Intrusion Detection, Information Sharing, Recovery, Survivability, Infrastructure
45Jingmin Zhou, Mark R. Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop Modeling network intrusion detection alerts for correlation. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF alert fusion, intrusion detection, capability, Alert correlation
45Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark Green 0001, Miguel Ángel García-Ruíz Toward Sound-Assisted Intrusion Detection Systems. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion detection, computer networks, multimodal interfaces, human-computer interfaces, computer forensics
45Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque E-NIPS: An Event-Based Network Intrusion Prediction System. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion detection and prediction, attack classes, network security
45Yang Li 0002, Binxing Fang, Li Guo 0001, You Chen TCM-KNN Algorithm for Supervised Network Intrusion Detection. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF supervised intrusion detection, TCM-KNN algorithm, data mining, machine learning, network security, TCM
45You Chen, Yang Li 0002, Xueqi Cheng, Li Guo 0001 Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF feature selection, intrusion detection, filter, hybrid, wrapper
45María Bermúdez-Edo, Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion event, Network security, Assessment, IDS
45Jingtao Yao 0001, Songlun Zhao, Lisa Fan An Enhanced Support Vector Machine Model for Intrusion Detection. Search on Bibsonomy RSKT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF support vector machine, feature selection, Intrusion detection, rough sets
45Yoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Damage Propagation, Information Security control system (ISMS), Forecast, Intrusion, Weather Forecasting
45Sanjay Rawat 0001, Ved Prakash Gulati, Arun K. Pujari A Fast Host-Based Intrusion Detection System Using Rough Set Theory. Search on Bibsonomy Trans. Rough Sets The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Data mining, Intrusion Detection, Rough Set, Decision Table, Anomaly, Misuse
45Pradeep Kannadiga, Mohammad Zulkernine DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. Search on Bibsonomy SNPD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security and distributed systems, mobile agents, Intrusion detection, distributed attacks
45Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu Techniques and tools for analyzing intrusion alerts. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Intrusion detection, security management, alert correlation
45Jian Guan, Daxin Liu 0001, Tong Wang 0005 Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems. Search on Bibsonomy ICCSA (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Data Mining, Intrusion Detection, Network Security, Fuzzy Sets
45Xian Rao, Cun-xi Dong, Shao-quan Yang Statistic Learning and Intrusion Detection. Search on Bibsonomy RSFDGrC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF statistic learning intrusion detection network security support vector machines neural network
45Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Bayesian network based detection, Missed alarms, Intrusion detection, Event correlation, False alarms
45Glenn A. Fink, Karen F. O'Donoghue, Brett L. Chappell, T. G. Turner A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Security, Evaluation, Real-Time, Intrusion Detection, Metrics, Distributed
44Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
43Chengpo Mu, X. J. Li, Houkuan Huang, Shengfeng Tian Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Online Risk Assessment, Alert Processing, Intrusion Response, Intrusion detection, D-S Evidence Theory
43Rituparna Chaki, Nabendu Chaki IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. Search on Bibsonomy CISIM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Compromise node, Internal intrusion, Phantom intrusion detection, Mobile ad hoc network, IDS
43Peng Ning, Dingbang Xu Hypothesizing and reasoning about attacks missed by intrusion detection systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Intrusion alert correlation, missed attacks, intrusion detection
43Tom Dunigan, Greg Hinkel Intrusion Detection and Intrusion Prevention on a Large Network: A Case Study. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
43Ambareen Siraj, Rayford B. Vaughn, Susan Bridges Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Kim Potter Kihlstrom, Priya Narasimhan The Starfish System: Providing Intrusion Detection and Intrusion Tolerance for Middleware Systems. Search on Bibsonomy WORDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
43Hervé Debar, Benjamin Morin Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
43Alfonso Valdes, Keith Skinner Adaptive, Model-Based Monitoring for Cyber Attack Detection. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Innovative approaches, IDS cooperation, Bayes nets, Intrusion detection
41Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis Gnort: High Performance Network Intrusion Detection Using Graphics Processors. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF parallel programming, network security, GPU, pattern matching, intrusion detection systems, SIMD
41Eric Totel, Frédéric Majorczyk, Ludovic Mé COTS Diversity Based Intrusion Detection and Application to Web Servers. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF COTS diversity, Intrusion detection, anomaly detection, design diversity
41Steven R. Johnston Development of a Legal Framework for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception
41Ulf Lindqvist, Erland Jonsson How to Systematically Classify Computer Security Intrusions. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Security, Classification, Intrusion Detection, Experiment, Computers, Taxonomy, Intrusion
41Zakia Marrakchi, Ludovic Mé, Bernard Vivinis, Benjamin Morin Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
41Anup K. Ghosh, Christoph C. Michael, Michael Schatz A Real-Time Intrusion Detection System Based on Learning Program Behavior. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
41Chris Strasburg, Natalia Stakhanova, Samik Basu 0001, Johnny S. Wong A Framework for Cost Sensitive Assessment of Intrusion Response Selection. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
41I. V. M. de Lima, Joelson A. Degaspari, João Bosco M. Sobral Intrusion detection through artificial neural networks. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 13052 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license