|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 605 occurrences of 378 keywords
|
|
|
Results
Found 983 publication records. Showing 983 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
94 | Raimundas Matulevicius, Nicolas Mayer, Patrick Heymans |
Alignment of Misuse Cases with Security Risk Management. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Security risk management, Information systems, Requirements engineering, Misuse cases |
94 | Jon Whittle 0001, Duminda Wijesekera, Mark Hartong |
Executable misuse cases for modeling security concerns. |
ICSE |
2008 |
DBLP DOI BibTeX RDF |
aspect scenarios, misuse cases |
83 | Paul Helman, Gunar E. Liepins |
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse. |
IEEE Trans. Software Eng. |
1993 |
DBLP DOI BibTeX RDF |
audit trail analysis, computer misuse, computer transactions, stationary stochastic processes, misuse detectors, detection accuracy, transaction attributes, statistical foundations, modeling, transaction processing, NP-hard, security of data, stochastic processes, auditing, density estimation, system security, computer crime, heuristic approach |
67 | Mark Hartong, Rajni Goel, Duminda Wijesekera |
Securing Positive Train Control Systems. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Railroad security, positive train control, use cases, misuse cases |
65 | Tae-Kyung Kim, Dong-Young Lee, Tai-Myung Chung |
Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model for Distributed System. |
EurAsia-ICT |
2002 |
DBLP DOI BibTeX RDF |
|
64 | Andrea Herrmann 0001, Barbara Paech |
MOQARE: misuse-oriented quality requirements engineering. |
Requir. Eng. |
2008 |
DBLP DOI BibTeX RDF |
Misuse Cases, Requirements specification, Requirements elicitation, Non-functional requirements, Quality requirements |
64 | Pablo García Bringas, Yoseba K. Penya |
Next-Generation Misuse and Anomaly Prevention System. |
ICEIS |
2008 |
DBLP DOI BibTeX RDF |
Data mining, Machine learning, Bayesian networks, Anomaly detection, Intrusion prevention, Misuse detection |
64 | Rebecca Cathey, Ling Ma 0001, Nazli Goharian, David A. Grossman |
Misuse detection for information retrieval systems. |
CIKM |
2003 |
DBLP DOI BibTeX RDF |
clustering, information retrieval, relevance feedback, user profile, misuse detection |
58 | Tor Stålhane, Guttorm Sindre |
A Comparison of Two Approaches to Safety Analysis Based on Use Cases. |
ER |
2007 |
DBLP DOI BibTeX RDF |
Safety engineering, experiment, misuse cases, FMEA |
49 | Jiong Zhang, Mohammad Zulkernine |
A Hybrid Network Intrusion Detection Technique Using Random Forests. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
Hybrid detection, Data mining, Intrusion detection, Network security, Random forests |
49 | Joshua J. Pauli, Dianxiang Xu |
Integrating Functional and Security Requirements with Use Case Decomposition. |
ICECCS |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Wayne Liu, Sudhir Aggarwal, Zhenhai Duan |
Incorporating accountability into internet email. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
email misuse, trust management, accountability |
48 | Brandon M. Malone, Ambareen Siraj |
Tracking requirements and threats for secure software development. |
ACM Southeast Regional Conference |
2008 |
DBLP DOI BibTeX RDF |
requirements tracking, security engineering, misuse case |
48 | Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001 |
Simplifying Signature Engineering by Reuse. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
Attack Signatures, Intrusion Detection, Computer Security, Misuse Detection |
48 | Chang Liu 0028, Debra J. Richardson |
Towards Discovery, Specification, and Verification of Component Usage. |
ASE |
1999 |
DBLP DOI BibTeX RDF |
Component Usage, Component Misuse, Software Testing, Component, Static Analysis, Software Quality, Component-Based Software Engineering |
46 | Fabrício A. Braz, Eduardo B. Fernández, Michael VanHilst |
Eliciting Security Requirements through Misuse Activities. |
DEXA Workshops |
2008 |
DBLP DOI BibTeX RDF |
software engineering, security requirements, security patterns |
46 | Michael Meier 0001, Ulrich Flegel, Sebastian Schmerl |
Efficiency Issues of Rete-Based Expert Systems for Misuse Detection. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Gunnar Peterson, John Steven |
Defining Misuse within the Development Process. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Tamotsu Shirado, Satoko Marumoto, Masaki Murata, Kiyotaka Uchimoto, Hitoshi Isahara |
A System to Indicate Honorific Misuse in Spoken Japanese. |
ICCPOL |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé |
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Ian F. Alexander |
Misuse Cases: Use Cases with Hostile Intent. |
IEEE Softw. |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Ian F. Alexander |
Initial Industrial Experience of Misuse Cases in Trade-Off Analysis. |
RE |
2002 |
DBLP DOI BibTeX RDF |
|
45 | Tor Stålhane, Guttorm Sindre |
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams. |
MoDELS |
2008 |
DBLP DOI BibTeX RDF |
safety hazards, experiment, Use cases, misuse cases |
45 | Joshua J. Pauli, Dianxiang Xu |
Misuse Case-Based Design and Analysis of Secure Software Architecture. |
ITCC (2) |
2005 |
DBLP DOI BibTeX RDF |
security, Software architecture, use case, misuse case |
45 | Guttorm Sindre, Andreas L. Opdahl |
Eliciting Security Requirements by Misuse Cases. |
TOOLS (37) |
2000 |
DBLP DOI BibTeX RDF |
security requirements elicitation, short lead time, use case application, formal specification, e-commerce, object-oriented programming, requirements engineering, systems analysis, security of data, diagrams, security requirements, m-commerce, functional requirement, misuse cases, use case diagrams |
39 | Jiong Zhang, Mohammad Zulkernine, Anwar Haque |
Random-Forests-Based Network Intrusion Detection Systems. |
IEEE Trans. Syst. Man Cybern. Part C |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Benjamin P. Turnbull, Jill Slay |
Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
wireless networking, digital evidence, network forensics |
38 | Sebastian Schmerl, Michael Vogel, Hartmut König |
Identifying Modeling Errors in Signatures by Model Checking. |
SPIN |
2009 |
DBLP DOI BibTeX RDF |
Attack Signatures, Intrusion Detection, Computer Security, Signature Verification, Misuse Detection, Promela, Spin model checker |
38 | Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides |
Moving from Requirements to Design Confronting Security Issues: A Case Study. |
OTM Conferences (2) |
2009 |
DBLP DOI BibTeX RDF |
Misuse Cases, Requirements Specification, Software Security, Risk Analysis, Security Patterns |
38 | Vidar Kongsli |
Security testing with Selenium. |
OOPSLA Companion |
2007 |
DBLP DOI BibTeX RDF |
misuse stories, security, testing, agile |
38 | Adrian Spalka, Jan Lehnhardt |
A Comprehensive Approach to Anomaly Detection in Relational Databases. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
relational databases, anomaly detection, Database security, misuse detection |
38 | Fernando Godínez, Dieter Hutter, Raúl Monroy |
Service Discrimination and Audit File Reduction for Effective Intrusion Detection. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
Object Reduction, Intrusion Detection, Dimensionality Reduction, Misuse Detection |
36 | Guttorm Sindre |
A Look at Misuse Cases for Safety Concerns. |
Situational Method Engineering |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Michael Meier 0001, Sebastian Schmerl, Hartmut König |
Improving the Efficiency of Misuse Detection. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Kerryann Wyatt, James G. Phillips |
Internet use and misuse in the workplace. |
OZCHI |
2005 |
DBLP DOI BibTeX RDF |
personality, workplace, internet use |
36 | Nazli Goharian, Ling Ma 0001, Chris Meyers |
Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Shijie Song, Zunguo Huang, Huaping Hu, Shiyao Jin |
A Sequential Pattern Mining Algorithm for Misuse Intrusion Detection. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Kathia Regina L. Jucá, Azzedine Boukerche, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare |
Human Immune Anomaly and Misuse Based Detection for Computer System Operations: PART II. |
IPDPS |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Ulf Lindqvist, Phillip A. Porras |
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST). |
S&P |
1999 |
DBLP DOI BibTeX RDF |
|
35 | Inger Anne Tøndel, Jostein Jensen, Lillian Røstad |
Combining Misuse Cases with Attack Trees and Security Activity Models. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
security, requirements, threat models, attack tree, misuse case |
35 | Wayne W. Liu |
Identifying and Addressing Rogue Servers in Countering Internet Email Misuse. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
deterrence, identification, trust management, email, Accountability, false positives, misuse, e-discovery |
35 | Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim |
An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
malicious users, detection, insider threat, misuse |
35 | Paco Hope, Gary McGraw, Annie I. Antón |
Misuse and Abuse Cases: Getting Past the Positive. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
abuse cases, software development, software design, misuse cases |
35 | Ling Ma 0001, Nazli Goharian |
Using relevance feedback to detect misuse for information retrieval systems. |
CIKM |
2004 |
DBLP DOI BibTeX RDF |
security, relevance feedback, detection, misuse |
33 | Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay |
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
33 | Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay |
On Misuse of Nonce-Misuse Resistance : Adapting Differential Fault Attacks on (few) CAESAR Winners. |
IWASI |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Péter Kárpáti, Andreas L. Opdahl, Guttorm Sindre |
Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations. |
ARES |
2011 |
DBLP DOI BibTeX RDF |
|
33 | |
Book review: Misuse of public office: Corruption and misuse of public office, Colin Nicholls, Tim Daniel, Martin Polaine, John Hatchard, Oxford University Press (2006), (822 pp., hard-cover, £125.00), ISBN: 0 19 927458 4. |
Comput. Law Secur. Rev. |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Sarah-Jane Whittaker, Mohammad Zulkernine, Karen Rudie |
Towards Incorporating Discrete-Event Systems in Secure Software Development. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
anomaly detection, Software security, discrete-event systems, finite-state automata |
29 | Murat Gunestas, Duminda Wijesekera, Anoop Singhal |
Forensic Web Services. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2008 |
DBLP DOI BibTeX RDF |
transaction forensics, Web services, service oriented architecture |
29 | Zhengbing Hu, Zhitang Li, Junqi Wu |
A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Mei-Ling Shyu, Thiago Quirino, Zongxing Xie, Shu-Ching Chen, LiWu Chang |
Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems. |
ACM Trans. Auton. Adapt. Syst. |
2007 |
DBLP DOI BibTeX RDF |
adaptive sub-eigenspace modeling (ASEM), agent-based distributed system, intrusion detection, network security, Agent communications |
29 | Johan Peeters, Paul Dyson |
Cost-Effective Security. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Sushil Jajodia, Ting Yu 0001 |
Basic Security Concepts. |
Secure Data Management in Decentralized Systems |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Guttorm Sindre |
Mal-Activity Diagrams for Capturing Attacks on Business Processes. |
REFSQ |
2007 |
DBLP DOI BibTeX RDF |
business processes, security requirements, activity diagrams, social engineering, fraud |
29 | Dong Zhang, Lih-Bin Oh, Hock-Hai Teo |
An Experimental Study of the Factors Influencing Non-Work Related Use of IT Resources at Workplace. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Jungan Chen |
Abnormal Detection Algorithm Based on Match Range Model. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Wei Fan 0001, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan |
Using artificial anomalies to detect unknown and known network intrusions. |
Knowl. Inf. Syst. |
2004 |
DBLP DOI BibTeX RDF |
Artificial anomaly, Security, Intrusion detection, Anomaly detection |
29 | P. Ramasubramanian, Arputharaj Kannan |
Intelligent Multi-agent Based Database Hybrid Intrusion Prevention System. |
ADBIS |
2004 |
DBLP DOI BibTeX RDF |
Quickprop Prediction Technique, Neural Networks, Multi-Agents, Database Security |
29 | Alexandr Seleznyov, Seppo Puuronen |
HIDSUR: A Hybrid Intrusion Detection System Based on Real-Time User Recognition. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
HIDSUR, hybrid intrusion detection system, real-time user recognition, computer system protection, anomaly detection, online learning, computer network management, unauthorized access |
28 | Takao Okubo, Hidehiko Tanaka |
Identifying Security Aspects in Early Development Stages. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
web, requirement, AOSD, misuse case, application security |
28 | Yoseba K. Penya, Pablo García Bringas |
Experiences on Designing an Integral Intrusion Detection System. |
DEXA Workshops |
2008 |
DBLP DOI BibTeX RDF |
Data Mining, Machine Learning, Intrusion Detection, Bayesian Networks, Anomaly Detection, Intrusion Prevention, Misuse Detection |
28 | Tao Zou, Yimin Cui, Minhuan Huang, Cui Zhang |
Improving performance of intrusion detection system by applying a new machine learning strategy. |
CSTST |
2008 |
DBLP DOI BibTeX RDF |
clustering, classification, intrusion detection systems, misuse detection |
28 | Ulrich Flegel, Michael Meier 0001 |
Authorization Architectures for Privacy-Respecting Surveillance. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
privacy, Architecture, intrusion detection, authorization, surveillance, pseudonym, misuse detection |
28 | Tamotsu Shirado, Satoko Marumoto, Masaki Murata, Hitoshi Isahara |
Using Japanese honorific expressions: A psychological study. |
ACM Trans. Asian Lang. Inf. Process. |
2006 |
DBLP DOI BibTeX RDF |
honorific expressions, Japanese, misuse |
28 | Saket Kaushik, Duminda Wijesekera, Paul Ammann |
BPEL orchestration of secure webmail. |
SWS |
2006 |
DBLP DOI BibTeX RDF |
SMTP misuse cases, SMTP use cases, WSEmail, webmail, verification, BPEL |
28 | Sanjay Rawat 0001, Ved Prakash Gulati, Arun K. Pujari |
A Fast Host-Based Intrusion Detection System Using Rough Set Theory. |
Trans. Rough Sets |
2005 |
DBLP DOI BibTeX RDF |
Data mining, Intrusion Detection, Rough Set, Decision Table, Anomaly, Misuse |
28 | Nazli Goharian, Ling Ma 0001 |
On off-topic access detection in information systems. |
CIKM |
2005 |
DBLP DOI BibTeX RDF |
security, detection, insider threat, unauthorized access, misuse |
28 | Konstantin Knorr |
Dynamic Access Control through Petri Net Workflows. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
Petri net workflows, access control matrix, privileges, data misuse, Petri nets, information systems, information systems, authorisation, workflow management software, protection mechanism, dynamic access control |
28 | Marta Teresa Acevedo, David Fillingham, John Lucas Nicolettos |
Enterprise Security Applications of Partition Rule Based Access Control (PRBAC). |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
enterprise security applications, partition rule-based access control, electronically managed information, information misuse, economic well-being, military access control needs, business enterprise access control needs, PRBAC, information sensitivity, individual authorizations, user-defined security policy, data security labels, user public-key certificates, authorisation, information loss, global markets |
26 | Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki |
Modeling Misuse Patterns. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Takao Okubo, Kenji Taguchi 0001, Nobukazu Yoshioka |
Misuse Cases + Assets + Security Goals. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Tong-Lee Lim, Tieyan Li |
Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
26 | John D'Arcy, Anat Hovav |
Deterring internal information systems misuse. |
Commun. ACM |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Eduardo Mosqueira-Rey, Amparo Alonso-Betanzos, Belén Baldonedo del Río, Jesús Lago Piñeiro |
A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum |
A framework for misuse detection in ad hoc networks- part II. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum |
A framework for misuse detection in ad hoc Networks-part I. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Timothy Paul Cronan, C. Bryan Foltz, Thomas W. Jones |
Piracy, computer crime, and IS misuse at the university. |
Commun. ACM |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Zhixian Chen, Shunyi Zhang |
An Approach to Network Misuse Detection Based on Extension Matrix and Genetic Algorithm. |
IEEE ICCI |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Antonella De Angeli, Sheryl Brahnam, Peter Wallis 0001, Alan J. Dix |
Misuse and abuse of interactive technologies. |
CHI Extended Abstracts |
2006 |
DBLP DOI BibTeX RDF |
abuse, disinhibition, machine violence, mediated verbal abuse, user aggression |
26 | Guttorm Sindre, Andreas L. Opdahl |
Eliciting security requirements with misuse cases. |
Requir. Eng. |
2005 |
DBLP DOI BibTeX RDF |
Extra-functional requirements, Requirements determination, Scenarios, Use cases, Requirements analysis, Requirements specification, Requirements elicitation, Security requirements |
26 | I. Finizio, Claudio Mazzariello, Carlo Sansone |
Combining Genetic-Based Misuse and Anomaly Detection for Reliably Detecting Intrusions in Computer Networks. |
ICIAP |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Fabrice Gadaud, M. Blanc, F. Combeau |
An adaptive instrumented node for efficient anomalies and misuse detections in HPC environment. |
CCGRID |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Dae-Ki Kang, Doug Fuller, Vasant G. Honavar |
Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Ryan Shaun Baker, Albert T. Corbett, Kenneth R. Koedinger |
Detecting Student Misuse of Intelligent Tutoring Systems. |
Intelligent Tutoring Systems |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Michael Meier 0001 |
A Model for the Semantics of Attack Signatures in Misuse Detection Systems. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Jean-Paul M. G. Linnartz, Pim Tuyls |
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. |
AVBPA |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Jean-Philippe Pouzol, Mireille Ducassé |
From Declarative Signatures to Misuse IDS. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Robert F. Erbacher, Deborah A. Frincke |
Visualization in Detection of Intrusions and Misuse in Large Scale Networks. |
IV |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Javier G. Marín-Blázquez, Gregorio Martínez Pérez |
Intrusion detection using a linguistic hedged fuzzy-XCS classifier system. |
Soft Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau 0001, Peter G. Neumann, Jennifer Rexford |
Risking Communications Security: Potential Hazards of the Protect America Act. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Robert L. Fanelli |
A Hybrid Model for Immune Inspired Network Intrusion Detection. |
ICARIS |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001, René Rietz |
Systematic Signature Engineering by Re-use of Snort Signatures. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Victor R. Basili, Marvin V. Zelkowitz, Dag I. K. Sjøberg, Philip Johnson, Anthony J. Cowling |
Protocols in the use of empirical software engineering artifacts. |
Empir. Softw. Eng. |
2007 |
DBLP DOI BibTeX RDF |
Ownership of data, Proper use and reuse of data and artifacts, Experimentation, Testbeds, Data sharing |
20 | Latifur Khan, Mamoun Awad, Bhavani Thuraisingham |
A new intrusion detection system using support vector machines and hierarchical clustering. |
VLDB J. |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Vukasin Pejovic, Slobodan Bojanic, Carlos Carreras |
Adding Value to TCP/IP Based Information exchange Security by Specialized Hardware. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Sebastian Schmerl, Hartmut König |
Towards Systematic Signature Testing. |
TestCom/FATES |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit |
A Hybrid Intrusion Detection and Visualization System. |
ECBS |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Bo Zhu, Sanjeev Setia, Sushil Jajodia |
Providing witness anonymity in peer-to-peer systems. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
k-times, witness anonymity, privacy, peer-to-peer systems, anonymous authentication |
20 | Vidar Kongsli |
Towards agile security in web applications. |
OOPSLA Companion |
2006 |
DBLP DOI BibTeX RDF |
security, agile software development |
Displaying result #1 - #100 of 983 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|