The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for misuse with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1989 (15) 1990-1996 (19) 1997-1998 (16) 1999 (16) 2000 (17) 2001 (17) 2002 (25) 2003 (36) 2004 (44) 2005 (74) 2006 (74) 2007 (68) 2008 (76) 2009 (56) 2010 (19) 2011 (23) 2012 (24) 2013-2014 (36) 2015 (19) 2016 (22) 2017 (25) 2018 (30) 2019 (44) 2020 (50) 2021 (34) 2022 (48) 2023 (47) 2024 (9)
Publication types (Num. hits)
article(316) incollection(5) inproceedings(651) phdthesis(10) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 605 occurrences of 378 keywords

Results
Found 983 publication records. Showing 983 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
94Raimundas Matulevicius, Nicolas Mayer, Patrick Heymans Alignment of Misuse Cases with Security Risk Management. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security risk management, Information systems, Requirements engineering, Misuse cases
94Jon Whittle 0001, Duminda Wijesekera, Mark Hartong Executable misuse cases for modeling security concerns. Search on Bibsonomy ICSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF aspect scenarios, misuse cases
83Paul Helman, Gunar E. Liepins Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF audit trail analysis, computer misuse, computer transactions, stationary stochastic processes, misuse detectors, detection accuracy, transaction attributes, statistical foundations, modeling, transaction processing, NP-hard, security of data, stochastic processes, auditing, density estimation, system security, computer crime, heuristic approach
67Mark Hartong, Rajni Goel, Duminda Wijesekera Securing Positive Train Control Systems. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Railroad security, positive train control, use cases, misuse cases
65Tae-Kyung Kim, Dong-Young Lee, Tai-Myung Chung Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model for Distributed System. Search on Bibsonomy EurAsia-ICT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
64Andrea Herrmann 0001, Barbara Paech MOQARE: misuse-oriented quality requirements engineering. Search on Bibsonomy Requir. Eng. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Misuse Cases, Requirements specification, Requirements elicitation, Non-functional requirements, Quality requirements
64Pablo García Bringas, Yoseba K. Penya Next-Generation Misuse and Anomaly Prevention System. Search on Bibsonomy ICEIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data mining, Machine learning, Bayesian networks, Anomaly detection, Intrusion prevention, Misuse detection
64Rebecca Cathey, Ling Ma 0001, Nazli Goharian, David A. Grossman Misuse detection for information retrieval systems. Search on Bibsonomy CIKM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF clustering, information retrieval, relevance feedback, user profile, misuse detection
58Tor Stålhane, Guttorm Sindre A Comparison of Two Approaches to Safety Analysis Based on Use Cases. Search on Bibsonomy ER The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Safety engineering, experiment, misuse cases, FMEA
49Jiong Zhang, Mohammad Zulkernine A Hybrid Network Intrusion Detection Technique Using Random Forests. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hybrid detection, Data mining, Intrusion detection, Network security, Random forests
49Joshua J. Pauli, Dianxiang Xu Integrating Functional and Security Requirements with Use Case Decomposition. Search on Bibsonomy ICECCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Wayne Liu, Sudhir Aggarwal, Zhenhai Duan Incorporating accountability into internet email. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF email misuse, trust management, accountability
48Brandon M. Malone, Ambareen Siraj Tracking requirements and threats for secure software development. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF requirements tracking, security engineering, misuse case
48Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001 Simplifying Signature Engineering by Reuse. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attack Signatures, Intrusion Detection, Computer Security, Misuse Detection
48Chang Liu 0028, Debra J. Richardson Towards Discovery, Specification, and Verification of Component Usage. Search on Bibsonomy ASE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Component Usage, Component Misuse, Software Testing, Component, Static Analysis, Software Quality, Component-Based Software Engineering
46Fabrício A. Braz, Eduardo B. Fernández, Michael VanHilst Eliciting Security Requirements through Misuse Activities. Search on Bibsonomy DEXA Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software engineering, security requirements, security patterns
46Michael Meier 0001, Ulrich Flegel, Sebastian Schmerl Efficiency Issues of Rete-Based Expert Systems for Misuse Detection. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Gunnar Peterson, John Steven Defining Misuse within the Development Process. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Tamotsu Shirado, Satoko Marumoto, Masaki Murata, Kiyotaka Uchimoto, Hitoshi Isahara A System to Indicate Honorific Misuse in Spoken Japanese. Search on Bibsonomy ICCPOL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Ian F. Alexander Misuse Cases: Use Cases with Hostile Intent. Search on Bibsonomy IEEE Softw. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
46Ian F. Alexander Initial Industrial Experience of Misuse Cases in Trade-Off Analysis. Search on Bibsonomy RE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
45Tor Stålhane, Guttorm Sindre Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams. Search on Bibsonomy MoDELS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF safety hazards, experiment, Use cases, misuse cases
45Joshua J. Pauli, Dianxiang Xu Misuse Case-Based Design and Analysis of Secure Software Architecture. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, Software architecture, use case, misuse case
45Guttorm Sindre, Andreas L. Opdahl Eliciting Security Requirements by Misuse Cases. Search on Bibsonomy TOOLS (37) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF security requirements elicitation, short lead time, use case application, formal specification, e-commerce, object-oriented programming, requirements engineering, systems analysis, security of data, diagrams, security requirements, m-commerce, functional requirement, misuse cases, use case diagrams
39Jiong Zhang, Mohammad Zulkernine, Anwar Haque Random-Forests-Based Network Intrusion Detection Systems. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part C The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Benjamin P. Turnbull, Jill Slay Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF wireless networking, digital evidence, network forensics
38Sebastian Schmerl, Michael Vogel, Hartmut König Identifying Modeling Errors in Signatures by Model Checking. Search on Bibsonomy SPIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Attack Signatures, Intrusion Detection, Computer Security, Signature Verification, Misuse Detection, Promela, Spin model checker
38Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides Moving from Requirements to Design Confronting Security Issues: A Case Study. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Misuse Cases, Requirements Specification, Software Security, Risk Analysis, Security Patterns
38Vidar Kongsli Security testing with Selenium. Search on Bibsonomy OOPSLA Companion The full citation details ... 2007 DBLP  DOI  BibTeX  RDF misuse stories, security, testing, agile
38Adrian Spalka, Jan Lehnhardt A Comprehensive Approach to Anomaly Detection in Relational Databases. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF relational databases, anomaly detection, Database security, misuse detection
38Fernando Godínez, Dieter Hutter, Raúl Monroy Service Discrimination and Audit File Reduction for Effective Intrusion Detection. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Object Reduction, Intrusion Detection, Dimensionality Reduction, Misuse Detection
36Guttorm Sindre A Look at Misuse Cases for Safety Concerns. Search on Bibsonomy Situational Method Engineering The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Michael Meier 0001, Sebastian Schmerl, Hartmut König Improving the Efficiency of Misuse Detection. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Kerryann Wyatt, James G. Phillips Internet use and misuse in the workplace. Search on Bibsonomy OZCHI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF personality, workplace, internet use
36Nazli Goharian, Ling Ma 0001, Chris Meyers Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Shijie Song, Zunguo Huang, Huaping Hu, Shiyao Jin A Sequential Pattern Mining Algorithm for Misuse Intrusion Detection. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Kathia Regina L. Jucá, Azzedine Boukerche, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare Human Immune Anomaly and Misuse Based Detection for Computer System Operations: PART II. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Ulf Lindqvist, Phillip A. Porras Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST). Search on Bibsonomy S&P The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
35Inger Anne Tøndel, Jostein Jensen, Lillian Røstad Combining Misuse Cases with Attack Trees and Security Activity Models. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, requirements, threat models, attack tree, misuse case
35Wayne W. Liu Identifying and Addressing Rogue Servers in Countering Internet Email Misuse. Search on Bibsonomy SADFE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF deterrence, identification, trust management, email, Accountability, false positives, misuse, e-discovery
35Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malicious users, detection, insider threat, misuse
35Paco Hope, Gary McGraw, Annie I. Antón Misuse and Abuse Cases: Getting Past the Positive. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF abuse cases, software development, software design, misuse cases
35Ling Ma 0001, Nazli Goharian Using relevance feedback to detect misuse for information retrieval systems. Search on Bibsonomy CIKM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, relevance feedback, detection, misuse
33Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
33Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay On Misuse of Nonce-Misuse Resistance : Adapting Differential Fault Attacks on (few) CAESAR Winners. Search on Bibsonomy IWASI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
33Péter Kárpáti, Andreas L. Opdahl, Guttorm Sindre Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations. Search on Bibsonomy ARES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33 Book review: Misuse of public office: Corruption and misuse of public office, Colin Nicholls, Tim Daniel, Martin Polaine, John Hatchard, Oxford University Press (2006), (822 pp., hard-cover, £125.00), ISBN: 0 19 927458 4. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Sarah-Jane Whittaker, Mohammad Zulkernine, Karen Rudie Towards Incorporating Discrete-Event Systems in Secure Software Development. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anomaly detection, Software security, discrete-event systems, finite-state automata
29Murat Gunestas, Duminda Wijesekera, Anoop Singhal Forensic Web Services. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF transaction forensics, Web services, service oriented architecture
29Zhengbing Hu, Zhitang Li, Junqi Wu A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Mei-Ling Shyu, Thiago Quirino, Zongxing Xie, Shu-Ching Chen, LiWu Chang Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems. Search on Bibsonomy ACM Trans. Auton. Adapt. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF adaptive sub-eigenspace modeling (ASEM), agent-based distributed system, intrusion detection, network security, Agent communications
29Johan Peeters, Paul Dyson Cost-Effective Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Sushil Jajodia, Ting Yu 0001 Basic Security Concepts. Search on Bibsonomy Secure Data Management in Decentralized Systems The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Guttorm Sindre Mal-Activity Diagrams for Capturing Attacks on Business Processes. Search on Bibsonomy REFSQ The full citation details ... 2007 DBLP  DOI  BibTeX  RDF business processes, security requirements, activity diagrams, social engineering, fraud
29Dong Zhang, Lih-Bin Oh, Hock-Hai Teo An Experimental Study of the Factors Influencing Non-Work Related Use of IT Resources at Workplace. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Jungan Chen Abnormal Detection Algorithm Based on Match Range Model. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Wei Fan 0001, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan Using artificial anomalies to detect unknown and known network intrusions. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Artificial anomaly, Security, Intrusion detection, Anomaly detection
29P. Ramasubramanian, Arputharaj Kannan Intelligent Multi-agent Based Database Hybrid Intrusion Prevention System. Search on Bibsonomy ADBIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Quickprop Prediction Technique, Neural Networks, Multi-Agents, Database Security
29Alexandr Seleznyov, Seppo Puuronen HIDSUR: A Hybrid Intrusion Detection System Based on Real-Time User Recognition. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF HIDSUR, hybrid intrusion detection system, real-time user recognition, computer system protection, anomaly detection, online learning, computer network management, unauthorized access
28Takao Okubo, Hidehiko Tanaka Identifying Security Aspects in Early Development Stages. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF web, requirement, AOSD, misuse case, application security
28Yoseba K. Penya, Pablo García Bringas Experiences on Designing an Integral Intrusion Detection System. Search on Bibsonomy DEXA Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data Mining, Machine Learning, Intrusion Detection, Bayesian Networks, Anomaly Detection, Intrusion Prevention, Misuse Detection
28Tao Zou, Yimin Cui, Minhuan Huang, Cui Zhang Improving performance of intrusion detection system by applying a new machine learning strategy. Search on Bibsonomy CSTST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF clustering, classification, intrusion detection systems, misuse detection
28Ulrich Flegel, Michael Meier 0001 Authorization Architectures for Privacy-Respecting Surveillance. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, Architecture, intrusion detection, authorization, surveillance, pseudonym, misuse detection
28Tamotsu Shirado, Satoko Marumoto, Masaki Murata, Hitoshi Isahara Using Japanese honorific expressions: A psychological study. Search on Bibsonomy ACM Trans. Asian Lang. Inf. Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF honorific expressions, Japanese, misuse
28Saket Kaushik, Duminda Wijesekera, Paul Ammann BPEL orchestration of secure webmail. Search on Bibsonomy SWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SMTP misuse cases, SMTP use cases, WSEmail, webmail, verification, BPEL
28Sanjay Rawat 0001, Ved Prakash Gulati, Arun K. Pujari A Fast Host-Based Intrusion Detection System Using Rough Set Theory. Search on Bibsonomy Trans. Rough Sets The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Data mining, Intrusion Detection, Rough Set, Decision Table, Anomaly, Misuse
28Nazli Goharian, Ling Ma 0001 On off-topic access detection in information systems. Search on Bibsonomy CIKM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, detection, insider threat, unauthorized access, misuse
28Konstantin Knorr Dynamic Access Control through Petri Net Workflows. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Petri net workflows, access control matrix, privileges, data misuse, Petri nets, information systems, information systems, authorisation, workflow management software, protection mechanism, dynamic access control
28Marta Teresa Acevedo, David Fillingham, John Lucas Nicolettos Enterprise Security Applications of Partition Rule Based Access Control (PRBAC). Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF enterprise security applications, partition rule-based access control, electronically managed information, information misuse, economic well-being, military access control needs, business enterprise access control needs, PRBAC, information sensitivity, individual authorizations, user-defined security policy, data security labels, user public-key certificates, authorisation, information loss, global markets
26Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki Modeling Misuse Patterns. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Takao Okubo, Kenji Taguchi 0001, Nobukazu Yoshioka Misuse Cases + Assets + Security Goals. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Tong-Lee Lim, Tieyan Li Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26John D'Arcy, Anat Hovav Deterring internal information systems misuse. Search on Bibsonomy Commun. ACM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Eduardo Mosqueira-Rey, Amparo Alonso-Betanzos, Belén Baldonedo del Río, Jesús Lago Piñeiro A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum A framework for misuse detection in ad hoc networks- part II. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum A framework for misuse detection in ad hoc Networks-part I. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Timothy Paul Cronan, C. Bryan Foltz, Thomas W. Jones Piracy, computer crime, and IS misuse at the university. Search on Bibsonomy Commun. ACM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Zhixian Chen, Shunyi Zhang An Approach to Network Misuse Detection Based on Extension Matrix and Genetic Algorithm. Search on Bibsonomy IEEE ICCI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Antonella De Angeli, Sheryl Brahnam, Peter Wallis 0001, Alan J. Dix Misuse and abuse of interactive technologies. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2006 DBLP  DOI  BibTeX  RDF abuse, disinhibition, machine violence, mediated verbal abuse, user aggression
26Guttorm Sindre, Andreas L. Opdahl Eliciting security requirements with misuse cases. Search on Bibsonomy Requir. Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Extra-functional requirements, Requirements determination, Scenarios, Use cases, Requirements analysis, Requirements specification, Requirements elicitation, Security requirements
26I. Finizio, Claudio Mazzariello, Carlo Sansone Combining Genetic-Based Misuse and Anomaly Detection for Reliably Detecting Intrusions in Computer Networks. Search on Bibsonomy ICIAP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Fabrice Gadaud, M. Blanc, F. Combeau An adaptive instrumented node for efficient anomalies and misuse detections in HPC environment. Search on Bibsonomy CCGRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Dae-Ki Kang, Doug Fuller, Vasant G. Honavar Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Ryan Shaun Baker, Albert T. Corbett, Kenneth R. Koedinger Detecting Student Misuse of Intelligent Tutoring Systems. Search on Bibsonomy Intelligent Tutoring Systems The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Michael Meier 0001 A Model for the Semantics of Attack Signatures in Misuse Detection Systems. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Jean-Paul M. G. Linnartz, Pim Tuyls New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. Search on Bibsonomy AVBPA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Jean-Philippe Pouzol, Mireille Ducassé From Declarative Signatures to Misuse IDS. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Robert F. Erbacher, Deborah A. Frincke Visualization in Detection of Intrusions and Misuse in Large Scale Networks. Search on Bibsonomy IV The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Javier G. Marín-Blázquez, Gregorio Martínez Pérez Intrusion detection using a linguistic hedged fuzzy-XCS classifier system. Search on Bibsonomy Soft Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau 0001, Peter G. Neumann, Jennifer Rexford Risking Communications Security: Potential Hazards of the Protect America Act. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Robert L. Fanelli A Hybrid Model for Immune Inspired Network Intrusion Detection. Search on Bibsonomy ICARIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001, René Rietz Systematic Signature Engineering by Re-use of Snort Signatures. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Victor R. Basili, Marvin V. Zelkowitz, Dag I. K. Sjøberg, Philip Johnson, Anthony J. Cowling Protocols in the use of empirical software engineering artifacts. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ownership of data, Proper use and reuse of data and artifacts, Experimentation, Testbeds, Data sharing
20Latifur Khan, Mamoun Awad, Bhavani Thuraisingham A new intrusion detection system using support vector machines and hierarchical clustering. Search on Bibsonomy VLDB J. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Vukasin Pejovic, Slobodan Bojanic, Carlos Carreras Adding Value to TCP/IP Based Information exchange Security by Specialized Hardware. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Sebastian Schmerl, Hartmut König Towards Systematic Signature Testing. Search on Bibsonomy TestCom/FATES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit A Hybrid Intrusion Detection and Visualization System. Search on Bibsonomy ECBS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Bo Zhu, Sanjeev Setia, Sushil Jajodia Providing witness anonymity in peer-to-peer systems. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF k-times, witness anonymity, privacy, peer-to-peer systems, anonymous authentication
20Vidar Kongsli Towards agile security in web applications. Search on Bibsonomy OOPSLA Companion The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, agile software development
Displaying result #1 - #100 of 983 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license