The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for masquerading with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-2004 (21) 2005-2006 (19) 2007-2011 (15) 2013-2022 (15) 2023-2024 (5)
Publication types (Num. hits)
article(11) inproceedings(63) phdthesis(1)
Venues (Conferences, Journals, ...)
CoRR(5) ACSAC(4) CCGRID(2) DSN(2) ICC(2) IPCCC(2) ACM Conference on Computer Sci...(1) ACNS(1) ADMA(1) ADVIS(1) AFIPS National Computer Confer...(1) ASIAN(1) CNSA(1) CNSR(1) COMPSAC(1) CSE (3)(1) More (+10 of total 63)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 63 occurrences of 49 keywords

Results
Found 75 publication records. Showing 75 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
94Kwong H. Yung Using Feedback to Improve Masquerade Detection. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF feedback-on-alarm, feedback policy, sequential classifier, online classifier, adaptive classifier, masquerading session, masquerading user, intrusion detection, naive-Bayes classifier, masquerade detection
78Vikram Goyal, Shyam K. Gupta 0001, Anand Gupta Malafide Intension and its mapping to Privacy Policy Purposes for Masquerading. Search on Bibsonomy IDEAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
78James M. Hayes Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
64Myung-Sub Lee, Chang-Hyeon Park, Young-Ho Sohn Differentiated Web Service System through Kernel-Level Realtime Scheduling and Load Balancing. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Differentiated QoS, masquerading, load balancer, tunneling
45Theodor Richardson Preventing Attacks on Back-End Servers using Masquerading/Honeypots. Search on Bibsonomy SNPD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Hicham Tout, William Hafner Phishpin: An Identity-Based Anti-phishing Approach. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Fernando C. Colón Osorio, Justin Whitney A stratified model for security in peer networks: a case for fine grain granularity. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Kwong H. Yung Using Self-Consistent Naive-Bayes to Detect Masquerades. Search on Bibsonomy PAKDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF self-consistent naive-Bayes, intrusion detection, anomaly detection, expectation-maximization algorithm, semisupervised learning, masquerade detection
28Jeongeun Park 0002, Taemoon Jeong, Hyeonseong Kim, Taehyun Byun, Seungyoon Shin, Keunjun Choi, Jaewoon Kwon, Taeyoon Lee, Matthew Pan, Sungjoon Choi Towards Embedding Dynamic Personas in Interactive Robots: Masquerading Animated Social Kinematics (MASK). Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Jonathan Oliver, Jue Mo, Susmit Yenkar, Raghav Batta, Sekhar Josyoula On the Role of Similarity in Detecting Masquerading Files. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Noriichi Kanaya, Shigeru Sato, Shuhei Ootani, Hidenori Takahashi Masquerading a Networked Embedded Computer as a Remote Object Using an Asynchronous Remote Object Protocol for a System With Small Servers. Search on Bibsonomy IEEE Trans. Instrum. Meas. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Jiaxuan Wu, Shuoqiang Zeng, Wei-Yang Chiu, Peichen Liu, Weizhi Meng 0001, Brooke Lampe Delay-masquerading Technique Upheld StrongBox: A Reinforced Side-Channel Protection. Search on Bibsonomy ICPADS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Jonathan Oliver, Jue Mo, Susmit Yenkar, Raghav Batta, Sekhar Josyoula On the Role of Similarity in Detecting Masquerading Files. Search on Bibsonomy ML4CS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Kirby Kuznia, Dhruvil Shah, Gil Speyer, Jason Yalim Artificial Intelligence to Classify and Detect Masquerading Users on HPC Systems from Shell Histories. Search on Bibsonomy PEARC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Shabbir Ahmed, Marcio Juliato, Christopher Gutierrez, Manoj R. Sastry Two-Point Voltage Fingerprinting: Increasing Detectability of ECU Masquerading Attacks. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
28Tomohiro Koide, Masato Uchida Behind The Mask: Masquerading The Reason for Prediction. Search on Bibsonomy COMPSAC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Rikhiya Ghosh Counter-masquerading: a logicist-AI approach to interventionist strategies. Search on Bibsonomy 2020   RDF
28Vincenzo DiLuoffo, William R. Michalson, Berk Sunar Credential Masquerading and OpenSSL Spy: Exploring ROS 2 using DDS security. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
28Jeff Robbins If Technology Is a Parasite Masquerading as a Symbiont?Are We the Host? Search on Bibsonomy IEEE Technol. Soc. Mag. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Kazuya Kakizaki, Kosuke Yoshida, Tsubasa Takahashi 0001 GlassMasq: Adversarial Examples Masquerading in Face Identification Systems with Feature Extractor. Search on Bibsonomy PST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Sohail Abbas, Mohammad Faisal, Haseeb Ur Rahman, Muhammad Zahid Khan, Madjid Merabti, Atta ur Rehman Khan Masquerading Attacks Detection in Mobile Ad Hoc Networks. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Wenson Chang On the Performance of the DNPS-Based Relay Networks under Masquerading Attack. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Pedro Ramos, Pierre Funderburk, Jennifer Gebelein Social Media and Online Gaming: A Masquerading Funding Source. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Yahia Elsayed, Ahmed F. Shosha Large scale detection of IDN domain name masquerading. Search on Bibsonomy eCrime The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Jacob W. Turner Tensors masquerading as matchgates: Relaxing planarity restrictions on Pfaffian circuits. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Jacob Turner Tensors Masquerading as Matchgates: Relaxing Planarity Restrictions on Pfaffian Circuits. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
28Anna Lan, Zhen Han, Dawei Zhang, Yichen Jiang, Tianhua Liu, Meihong Li An Anonymous Remote Attestation Protocol to Prevent Masquerading Attack. Search on Bibsonomy UIC/ATC/ScalCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Jing Jin, Jeff Offutt, Nan Zheng, Feng Mao, Aaron Koehl, Haining Wang Evasive bots masquerading as human beings on the web. Search on Bibsonomy DSN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Gundeep Singh Bindra Masquerading as a Trustworthy Entity through Portable Document File (PDF) Format. Search on Bibsonomy SocialCom/PASSAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Ranaganayakulu Dhanalakshmi, Chenniappan Chellappan Detection and Recognition of File Masquerading for E-mail and Data Security. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Ryuhei Tenmoku, Akito Nishigami, Fumihisa Shibata, Asako Kimura, Hideyuki Tamura Balancing Design Freedom and Constraints in Wall Posters Masquerading as AR Tracking Markers. Search on Bibsonomy HCI (13) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF geometric registration, poster, semi-fiducial, mixed reality, authoring tool
28Mina Guirguis, Jason Valdez Masquerading a Wired Covert Channel into a Wireless-like Channel. Search on Bibsonomy IPCCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Vidyaraman Sankaranarayanan, Suranjan Pramanik, Shambhu J. Upadhyaya Detecting Masquerading Users in a Document Management System. Search on Bibsonomy ICC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Chuanhuan Yin, Shengfeng Tian, Shaomin Mu Using Gap-Insensitive String Kernel to Detect Masquerading. Search on Bibsonomy ADMA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28James M. Hayes The Problem with Multiple Roots in Web Browsers - Certificate Masquerading. Search on Bibsonomy WETICE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Ragib Hasan, Marianne Winslett Trustworthy vacuuming and litigation holds in long-term high-integrity records retention. Search on Bibsonomy EDBT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Jae Yoon Chung, Byungchul Park, Young J. Won, John Strassner, James W. Hong Traffic Classification Based on Flow Similarity. Search on Bibsonomy IPOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Traffic classification, traffic monitoring
17Sang-Ho Na, Kyu-Jin Kim, Mohammad Mehedi Hassan, Eui-nam Huh Identity-based secure protocol scheme for wireless sensor network. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ID-based authentication, clustering, wireless sensor network, authentication, proxy
17Tatsuya Mori, Hideki Tode, Koso Murakami Integrated Method for Loss-Resilient Multicast Source Authentication and Data Reconstruction. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Vito Di Gesù, Giosuè Lo Bosco, Jerome H. Friedman Intruders pattern identification. Search on Bibsonomy ICPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Desmond Loh Chin Choong, Chia Yuan Cho, Chung Pheng Tan, Ri Seng Lee Identifying unique devices through wireless fingerprinting. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF spoof detection, wireless fingerprinting
17Lanlan Hu, Yixian Yang, Xinxin Niu Improved Remote User Authentication Scheme Preserving User Anonymity. Search on Bibsonomy CNSR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, anonymity, Smart cards
17Muhammad Torabi Dashti, Srijith Krishnan Nair, Hugo L. Jonker Nuovo DRM Paradiso: Towards a Verified Fair DRM Scheme. Search on Bibsonomy FSEN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Vito Di Gesù, Giosuè Lo Bosco Combining One Class Fuzzy KNN's. Search on Bibsonomy WILF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF genetic algorithms, similarity, Fuzzy classification
17Wilson Naik Bhukya, Suneel Kumar Kommuru, Atul Negi Masquerade Detection Based Upon GUI User Profiling in Linux Systems. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF GUI based Profiling, Mouse events, KDE, Linux Profiling, Intrusion detection, Anomaly detection, One-class SVM, Masquerade detection
17Alok Madhukar, Carey L. Williamson A Longitudinal Study of P2P Traffic Classification. Search on Bibsonomy MASCOTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Peer-to-Peer, Traffic Analysis, Network Traffic Measurement
17Pedro R. M. Inácio, Marek Hajduczenia, Mário M. Freire, Henrique J. A. da Silva, Paulo P. Monteiro Preamble Encryption Mechanism for Enhanced Privacy in Ethernet Passive Optical Networks. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ethernet Passive Optical Networks, encryption mechanism, EPON frame preamble, Security, privacy, EPON
17Ghazanfar Ali Safdar, Clare McGrath, Máire McLoone Limitations of existing wireless networks authentication and key management techniques for MANETs. Search on Bibsonomy ISCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Eun-Jun Yoon, Kee-Young Yoo Efficient Mutual Authentication Scheme with Smart Card. Search on Bibsonomy PRIMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authentication, Network security, Smart card, Secure protocol, Password
17Daesung Lee 0001, Ki-Chang Kim, Year Back Yoo IPBio: Embedding Biometric Data in IP Header for Per-Packet Authentication. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Yuan-Shun Dai, Michael G. Hinchey, Mingrui Qi, Xukai Zou Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jeffrey Erman, Martin F. Arlitt, Anirban Mahanti Traffic classification using clustering algorithms. Search on Bibsonomy MineNet The full citation details ... 2006 DBLP  DOI  BibTeX  RDF machine learning, classification, unsupervised clustering
17Shyam K. Gupta 0001, Sankalp Dubey, Vikram Goyal, Anand Gupta A System to test malafide intension based on privacy violation detection. Search on Bibsonomy ICDIM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Rupinder Gill, Jason Smith 0001, Andrew J. Clark Specification-Based Intrusion Detection in WLANs. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Bogdan C. Popescu, Maarten van Steen, Bruno Crispo, Andrew S. Tanenbaum, Jan Sacha, Ihor Kuz Securely Replicated Web Documents. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Eun-Jun Yoon, Kee-Young Yoo More Efficient and Secure Remote User Authentication Scheme using Smart Cards. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17William Yurcik, Chao Liu 0001 A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. Search on Bibsonomy CCGRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Zhi-gang Liao, Zeng-zhi Li, Yan Chen, Tao Zhan A Study of Secure Communications between Mobile Objects. Search on Bibsonomy ICECCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Singh 0001, Timothy K. Tsai SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Voice over IP system, Cross-protocol detection, Stateful detection, Intrusion detection, SIP, RTP
17Robert Beverly A Robust Classifier for Passive TCP/IP Fingerprinting. Search on Bibsonomy PAM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Manish Agrawal, Hemant Padmanabhan, Lokesh Pandey, H. Raghav Rao, Shambhu J. Upadhyaya A conceptual approach to information security in financial account aggregation. Search on Bibsonomy ICEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF account service providers, identity service providers, scraping, aggregation
17Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Layered networks, PCA, Anomaly detection, User behavior, Co-occurrence matrix
17John Felix C, Valli S Distributed Group Access Control Architecture for Secure Multicast. Search on Bibsonomy ADVIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Bernd Lamparter, Dirk Westhoff A Low-Cost Packet Originator Verification for Metering at Access-Routers. Search on Bibsonomy Networked Group Communication The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Packet originator verification, wireless last hop, charging support, unpredictable bits
17Hermann Kopetz Fault Containment and Error Detection in the Time-Triggered Architecture. Search on Bibsonomy ISADS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Mike Jochen, Lisa M. Marvel, Lori L. Pollock A Framework for Tamper Detection Marking of Mobile Applications. Search on Bibsonomy ISSRE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Arne Wiebalck, Peter T. Breuer, Volker Lindenstruth, Timm M. Steinbeck Fault-Tolerant Distributed Mass Storage for LHC Computing. Search on Bibsonomy CCGRID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Scott E. Coull, Joel W. Branch, Boleslaw K. Szymanski, Eric Breimer Intrusion Detection: A Bioinformatics Approach. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion detection, bioinformatics, pattern matching, sequence alignment, masquerade detection
17Ahmed Sameh Mohamed, Dalia Fakhry Security in Mobile Agent Systems. Search on Bibsonomy SAINT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Code Mess Up and Encryption, Security, Mobile Agents, Malicious Host
17Michael V. Capps Collaborative virtual entertainment: (if you can't beat 'em, join 'em?). Search on Bibsonomy CVE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Hung-Yu Lin, Lein Harn Authentication Protocols for Personal Communication Systems. Search on Bibsonomy SIGCOMM The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Cindy Cullen Internet vulnerabilities of one-time passcode mechanisms. Search on Bibsonomy LCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF one-time passcode mechanisms, passive attack, one-time passcode server, hacker tools, authentication, security of data, vulnerabilities, hackers, user identification
17Lein Harn, Hung-Yu Lin, Shoubao Yang A Software Authentication System for the Prevention of Computer Viruses. Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
17Mohammed Inam Ul Haq Insuring individual's privacy from statistical data base users. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1975 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #75 of 75 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license