|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 112 occurrences of 74 keywords
|
|
|
Results
Found 159 publication records. Showing 159 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
210 | Ting He 0001, Lang Tong |
Detecting Encrypted Stepping-Stone Connections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Signal Process. ![In: IEEE Trans. Signal Process. 55(5-1), pp. 1612-1623, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
146 | Linfeng Zhang, Anthony G. Persaud, Alan Johnson, Yong Guan |
Detection of stepping stone attack under delay and chaff perturbations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
125 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
Stepping-stone detection algorithm based on order preserving mapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 13th International Conference on Parallel and Distributed Systems, ICPADS 2007, Hsinchu, Taiwan, December 5-7, 2007, pp. 1-8, 2007, IEEE Computer Society, 978-1-4244-1889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
125 | Yongzhong Zhang, Jianhua Yang, Chunming Ye |
Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 477-486, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
115 | Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang |
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 383-397, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
time perturbation, chaff, intrusion detection, Network security, stepping-stone, evasion |
106 | Pai Peng, Peng Ning, Douglas S. Reeves |
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 334-349, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
104 | Hyungwoo Kang, Soon Jwa Hong, Dong Hoon Lee 0001 |
Matching Connection Pairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 642-649, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Connection pairs, Detoured attack, Traceback, Stepping stone, Backdoor |
102 | Han-Ching Wu, Shou-Hsuan Stephen Huang |
Detecting Stepping-Stone with Chaff Perturbations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 85-90, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Stepping-stone Detection, Chaff Perturbation, Intrusion Detection, Random Walk, Traceback |
96 | Avrim Blum, Dawn Xiaodong Song, Shobha Venkataraman |
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 258-277, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Random walks, Network intrusion detection, Stepping stones, Evasion, Interactive sessions |
94 | Jianhua Yang, Yongzhong Zhang |
Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 18-32, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
TCP packet-matching, intrusion detection, Network security, round-trip time, stepping-stone |
93 | Mohd Nizam Omar, Mohd Aizaini Maarof, Anazida Zainal |
Solving Time Gap Problems through the Optimization of Detecting Stepping Stone Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 2004 International Conference on Computer and Information Technology (CIT 2004), 14-16 September 2004, Wuhan, China, pp. 391-396, 2004, IEEE Computer Society, 0-7695-2216-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
93 | David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford |
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 17-35, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
83 | W. Timothy Strayer, Christine E. Jones, Beverly Schwartz, Sarah Edwards, Walter C. Milliken, Alden W. Jackson |
Efficient Multi-Dimensional Flow Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 531-538, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
correlation algorithms, flow correlation, stepping stone detection |
83 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
Detecting Stepping-Stone Connection Using Association Rule Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 90-97, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
82 | Han-Ching Wu, Shou-Hsuan Stephen Huang |
Performance of Neural Networks in Stepping-Stone Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 608-613, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
73 | Jianhua Yang, Byong Lee, Yongzhong Zhang |
Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings, pp. 303-317, 2006, Springer, 3-540-49462-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
intrusion detection, Network security, round-trip time, stepping-stone |
72 | Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang |
Stepping-Stone Detection Via Request-Response Traffic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 276-285, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
70 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Wei Ding 0003, Rebecca Kern, Jianhua Yang |
Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010, pp. 198-205, 2010, IEEE Computer Society, 978-0-7695-4018-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Stepping-stone attack, pattern recognition, intrusion detection, network security |
70 | Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura 0001, Long Ni, Shou-Hsuan Stephen Huang |
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: The IEEE 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, United Kingdom, May 26-29, 2009, pp. 546-551, 2009, IEEE Computer Society, 978-0-7695-3638-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection, network security, correlation coefficient, stepping-stone, interactive session |
64 | Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang 0005 |
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 6-10 June 2005, Columbus, OH, USA, pp. 107-113, 2005, IEEE Computer Society, 0-7695-2328-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Xinyuan Wang 0005, Douglas S. Reeves, Shyhtsun Felix Wu |
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings, pp. 244-263, 2002, Springer, 3-540-44345-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
62 | Jianhua Yang, Shou-Hsuan Stephen Huang, Ming Dong Wan |
A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 231-236, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
clustering, intrusion detection, Network security, partitioning, round-trip time, stepping-stone |
62 | Kwong H. Yung |
Detecting Long Connection Chains of Interactive Terminal Sessions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 1-16, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
connection chain, terminal session, delayed acknowledgment, reply echo, echo delay, intrusion detection, network security, computer security, network protocol, Stepping stone |
53 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 14th International Conference on Parallel and Distributed Systems, ICPADS 2008, Melbourne, Victoria, Australia, December 8-10, 2008, pp. 485-492, 2008, IEEE Computer Society, 978-0-7695-3434-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | W. Timothy Strayer, Christine E. Jones, Beverly Schwartz |
Architecture for Multi-Stage Network Attack Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 15-17 November 2005, Sydney, Australia, Proceedings, pp. 776-785, 2005, IEEE Computer Society, 0-7695-2421-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Wei Ding 0003, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, Zach Riggle |
Detecting Stepping-Stone Intruders with Long Connection Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 665-669, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
51 | Jianhua Yang, Byong Lee |
Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 2-12, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Yongping Tang, Yema Liverpool, Thomas E. Daniels |
Monitor placement for stepping stone analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | V. Srinivasan, Gerald L. Thompson |
Benefit-Cost Analysis of Coding Techniques for the Primal Transportation Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 20(2), pp. 194-213, 1973. The full citation details ...](Pics/full.jpeg) |
1973 |
DBLP DOI BibTeX RDF |
|
41 | Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S. H. Huang |
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010, pp. 1101-1107, 2010, IEEE Computer Society, 978-0-7695-4018-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
time-jittering, chaff-perturbation, intrusion detection, Network security, manipulation, stepping-stone, evasion |
32 | Jianhua Yang, Shou-Hsuan Stephen Huang |
Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 1005-1010, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Zhengzhe Liu, Peng Dai, Ruihui Li, Xiaojuan Qi 0001, Chi-Wing Fu |
ISS++: Image as Stepping Stone for Text-Guided 3D Shape Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.15181, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Kevin A. Fischer |
Reflective Linguistic Programming (RLP): A Stepping Stone in Socially-Aware AGI (SocialAGI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.12647, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Zhengzhe Liu, Peng Dai, Ruihui Li, Xiaojuan Qi 0001, Chi-Wing Fu |
DreamStone: Image as a Stepping Stone for Text-Guided 3D Shape Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 45(12), pp. 14385-14403, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Leonard Stellbrink, Lilian Kojan, André Calero Valdez |
Making Assumptions Transparent: Iterative Exploratory Modeling as a Stepping Stone for Agent-Based Model Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (16) ![In: Social Computing and Social Media - 15th International Conference, SCSM 2023, Held as Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings, Part II, pp. 389-402, 2023, Springer, 978-3-031-35926-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Detravious Jamari Brinkley, Emmanuel Johnson, Tiantian Feng, Yolanda Gil |
Reproducibility as a Stepping Stone to Intelligent Assistants for Data Analysis: Recreating a Study of Physical Activity, Sleep, and Work Shift in Nurses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IUI Companion ![In: Companion Proceedings of the 28th International Conference on Intelligent User Interfaces, IUI 2023, Sydney, NSW, Australia, March 27-31, 2023, pp. 246-250, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Marko Orosnjak, Mitar Jocanovic, Marko Pencic, Dragana Oros |
From Signals to Insights: Uncovering Latent Degradation with Deep Learning as a Stepping Stone Towards Digital Twins of Failures (DTFs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSRS ![In: 7th International Conference on System Reliability and Safety, ICSRS 2023, Bologna, Italy, November 22-24, 2023, pp. 371-375, 2023, IEEE, 979-8-3503-0605-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Zhengzhe Liu, Peng Dai, Ruihui Li, Xiaojuan Qi 0001, Chi-Wing Fu |
ISS: Image as Stepping Stone for Text-Guided 3D Shape Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLR ![In: The Eleventh International Conference on Learning Representations, ICLR 2023, Kigali, Rwanda, May 1-5, 2023, 2023, OpenReview.net. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
29 | Jianhua Yang, Lixin Wang, Suhev Shakya |
Modelling Network Traffic and Exploiting Encrypted Packets to Detect Stepping-stone Intrusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Internet Serv. Inf. Secur. ![In: J. Internet Serv. Inf. Secur. 12(1), pp. 2-25, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Yi-Ping You, Yi-Chiao Su |
Reduced O3 subsequence labelling: a stepping stone towards optimisation sequence prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Connect. Sci. ![In: Connect. Sci. 34(1), pp. 2860-2877, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Zhengzhe Liu, Peng Dai, Ruihui Li, Xiaojuan Qi 0001, Chi-Wing Fu |
ISS: Image as Stepping Stone for Text-Guided 3D Shape Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.04145, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Vésteinn Snæbjarnarson, Hafsteinn Einarsson |
Cross-Lingual QA as a Stepping Stone for Monolingual Open QA in Icelandic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.01918, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Lixin Wang, Jianhua Yang, Austin Lee |
An Effective Approach for Stepping-Stone Intrusion Detection Using Packet Crossover. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 23rd International Conference, WISA 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers, pp. 77-88, 2022, Springer, 978-3-031-25658-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Noah Neundorfer, Jianhua Yang, Lixin Wang |
Modeling Network Traffic via Identifying Encrypted Packets to Detect Stepping-Stone Intrusion Under the Framework of Heterogonous Packet Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Volume 2, pp. 516-527, 2022, Springer, 978-3-030-99586-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Jonathan Rodriguez 0001, Georgios P. Koudouridis, Xavier Gelabert, Muhammad Tayyab, Riccardo Bassoli, Frank H. P. Fitzek, Roberto Torre Arranz, Raed Abd-Alhameed, Maryam Sajedin, Issa T. E. Elfergani, Sarah Irum, Gerrit Schulte, Pedro Diogo, Fatma Marzouk, Marcus de Ree, Georgios Mantas, Ilias Politis |
Secure Virtual Mobile Small Cells: A Stepping Stone Toward 6G. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Stand. Mag. ![In: IEEE Commun. Stand. Mag. 5(2), pp. 28-36, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Lixin Wang, Jianhua Yang, Michael Workman, Peng-Jun Wan |
A Framework to Test Resistency of Detection Algorithms for Stepping-Stone Intrusion on Time-Jittering Manipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Commun. Mob. Comput. ![In: Wirel. Commun. Mob. Comput. 2021, pp. 1807509:1-1807509:8, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Lixin Wang, Jianhua Yang, XiaoHua Xu, Peng-Jun Wan |
Mining Network Traffic with the k -Means Clustering Algorithm for Stepping-Stone Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Commun. Mob. Comput. ![In: Wirel. Commun. Mob. Comput. 2021, pp. 6632671:1-6632671:9, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Jonathan Rodriguez 0001, George P. Koudouridis, Xavier Gelabert, Muhammad Tayyab, Riccardo Bassoli, Frank H. P. Fitzek, Roberto Torre Arranz, Raed Abd-Alhameed, Maryam Sajedin, Issa T. E. Elfergani, Sarah Irum, Gerrit Schulte, Pedro Diogo, Fatma Marzouk, Marcus de Ree, Georgios Mantas, Ilias Politis |
Secure Virtual Mobile Small Cells: A Stepping Stone Towards 6G. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2105.01373, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
29 | Louis Allen, Jack Atkinson, Dinusha Jayasundara, Joan L. Cordiner, Peyman Z. Moghadam |
Data visualization for Industry 4.0: A stepping-stone toward a digital future, bridging the gap between academia and industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Patterns ![In: Patterns 2(5), pp. 100266, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Lixin Wang |
Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 21(22), pp. 7464, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Danesh Ashouri Vajari, Maria Vomero, Volker A. Coenen, Thomas Stieglitz |
A stepping stone to enable preclinical evaluation of multimodal thin-film probes in small animal models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NER ![In: 10th International IEEE/EMBS Conference on Neural Engineering, NER 2021, Virtual Event, Italy, May 4-6, 2021, pp. 132-135, 2021, IEEE, 978-1-7281-4337-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Lixin Wang, Suhev Shakya, Michael Workman |
Identify Encrypted Packets to Detect Stepping-Stone Intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 2, pp. 536-547, 2021, Springer, 978-3-030-75074-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Zhaoming Xie, Hung Yu Ling, Nam Hee Kim, Michiel van de Panne |
ALLSTEPS: Curriculum-driven Learning of Stepping Stone Skills. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2005.04323, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
29 | Zhaoming Xie, Hung Yu Ling, Nam Hee Kim, Michiel van de Panne |
ALLSTEPS: Curriculum-driven Learning of Stepping Stone Skills. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Graph. Forum ![In: Comput. Graph. Forum 39(8), pp. 213-224, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Lixin Wang, Jianhua Yang, Mary McCormick, Peng-Jun Wan, XiaoHua Xu |
Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: 39th IEEE International Performance Computing and Communications Conference, IPCCC 2020, Austin, TX, USA, November 6-8, 2020, pp. 1-8, 2020, IEEE, 978-1-7281-9829-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Henry Clausen, Michael Scott Gibson, David Aspinall 0001 |
Evading Stepping-Stone Detection with Enough Chaff. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings, pp. 431-446, 2020, Springer, 978-3-030-65744-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Sameera Kannangara, Egemen Tanin, Aaron Harwood, Shanika Karunasekera |
Stepping Stone Graph: A Graph for Finding Movement Corridors using Sparse Trajectories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Spatial Algorithms Syst. ![In: ACM Trans. Spatial Algorithms Syst. 5(4), pp. 23:1-23:24, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Yanyan Jiang 0003 |
Competition and the stepping-stone theory in the broadband access market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Clust. Comput. ![In: Clust. Comput. 22(Supplement), pp. 5071-5087, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Marco A. Gamarra, Sachin Shetty, David M. Nicol, Laurent Njilla, Oscar R. González |
Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: 2019 IEEE Global Communications Conference, GLOBECOM 2019, Waikoloa, HI, USA, December 9-13, 2019, pp. 1-7, 2019, IEEE, 978-1-7281-0962-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Ana Beatriz Cruz, Armando Sousa, Ângela Cardoso, Bernardo Valente, Ana Reis 0001 |
Smart Data Visualisation as a Stepping Stone for Industry 4.0 - a Case Study in Investment Casting Industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ROBOT (1) ![In: Robot 2019: Fourth Iberian Robotics Conference - Advances in Robotics, Volume 1, Porto, Portugal, 20-22 November, 2019., pp. 657-668, 2019, Springer, 978-3-030-35989-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Lixin Wang, Andrew Lesh, Brian Lockerbie |
Manipulating network traffic to evade stepping-stone intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 3-4, pp. 34-45, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Phillip S. Hudson, Kyungreem Han, H. Lee Woodcock III, Bernard R. Brooks |
Force matching as a stepping stone to QM/MM CB[8] host/guest binding free energies: a SAMPL6 cautionary tale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Aided Mol. Des. ![In: J. Comput. Aided Mol. Des. 32(10), pp. 983-999, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Lixin Wang, Jianhua Yang |
A research survey in stepping-stone intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Wirel. Commun. Netw. ![In: EURASIP J. Wirel. Commun. Netw. 2018, pp. 276, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Floris Devriendt, Darie Moldovan, Wouter Verbeke |
A Literature Survey and Experimental Evaluation of the State-of-the-Art in Uplift Modeling: A Stepping Stone Toward the Development of Prescriptive Analytics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Big Data ![In: Big Data 6(1), pp. 13-41, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Alex Lu 0001, Jason Brill, Tawanna R. Dillahunt |
DreamGigs: A "Stepping Stone" for Low-resource Job Seekers to Reach Their Ideal Job. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW Companion ![In: Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW 2018, Jersey City, NJ, USA, November 03-07, 2018, pp. 317-320, 2018, ACM, 978-1-4503-6018-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Marco A. Gamarra, Sachin Shetty, David M. Nicol, Oscar Gonazlez, Charles A. Kamhoua, Laurent Njilla |
Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: 2018 IEEE International Conference on Communications, ICC 2018, Kansas City, MO, USA, May 20-24, 2018, pp. 1-7, 2018, IEEE, 978-1-5386-3180-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Sameera Kannangara, Egemen Tanin, Aaron Harwood, Shanika Karunasekera |
Stepping stone graph for public movement analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGSPATIAL/GIS ![In: Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, SIGSPATIAL 2018, Seattle, WA, USA, November 06-09, 2018, pp. 149-158, 2018, ACM, 978-1-4503-5889-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Yongzhong Zhang, Robert King, Tim Tolbert |
Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 32nd International Conference on Advanced Information Networking and Applications Workshops, AINA 2018 workshops, Krakow, Poland, May 16-18, 2018, pp. 515-520, 2018, IEEE Computer Society, 978-1-5386-5395-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Dirk Stroobandt, Catalin Bogdan Ciobanu, Marco D. Santambrogio, Gabriel Figueiredo, Andreas Brokalakis, Dionisios N. Pnevmatikatos, Michael Hübner 0001, Tobias Becker, Alex J. W. Thom |
An open reconfigurable research platform as stepping stone to exascale high-performance computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, Switzerland, March 27-31, 2017, pp. 416-421, 2017, IEEE, 978-3-9815370-8-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Yongzhong Zhang, Guoqing Zhao |
Integrate Stepping-Stone Intrusion Detection Technique into Cybersecurity Curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 31st International Conference on Advanced Information Networking and Applications Workshops, AINA 2017 Workshops, Taipei, Taiwan, March 27-29, 2017, pp. 1-6, 2017, IEEE Computer Society, 978-1-5090-6231-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Haoyu Song 0001, Jun Gong, Hongfei Chen, Tom Tofigh |
Dynamic Network Probes: A Stepping Stone to Omni Network Visibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1612.02862, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
29 | Xiaoqiang Xu, Jing Zhang 0015, Qianmu Li |
Equalized Interval Centroid Based Watermarking Scheme for Stepping Stone Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: IEEE First International Conference on Data Science in Cyberspace, DSC 2016, Changsha, China, June 13-16, 2016, pp. 109-117, 2016, IEEE Computer Society, 978-1-5090-1192-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Pablo Corbalan, Ramona Marfievici, Victor Cionca, Donna O'Shea, Dirk Pesch |
Into the SMOG: The Stepping Stone to Centralized WSN Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASS ![In: 13th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2016, Brasília, Brazil, October 10-13, 2016, pp. 118-126, 2016, IEEE Computer Society, 978-1-5090-2833-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Shou-Hsuan Stephen Huang, Hongyang Zhang, Michael Phay |
Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016, Crans-Montana, Switzerland, 23-25 March, 2016, pp. 1043-1050, 2016, IEEE Computer Society, 978-1-5090-1857-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Yongzhong Zhang |
RTT-Based Random Walk Approach to Detect Stepping-Stone Intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 29th IEEE International Conference on Advanced Information Networking and Applications, AINA 2015, Gwangju, South Korea, March 24-27, 2015, pp. 558-563, 2015, IEEE Computer Society, 978-1-4799-7905-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
29 | David M. Nicol, Vikas Mallapura |
Modeling and analysis of stepping stone attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 2014 Winter Simulation Conference, Savannah, GA, USA, December 7-10, 2014, pp. 3036-3047, 2014, IEEE/ACM. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Claudia Loebbecke, Helmut Krcmar |
Information Systems And Employment: From Idealization To Understanding As Stepping Stone To Action. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UKAIS ![In: UKAIS 2014, UK Academy for Information Systems 19th Annual Conference 2014, St Catherines College, Oxford, UK, April 7-9, 2014, pp. 15, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
29 | Han-Wei Hsiao, Huey-Min Sun, Wei-Cheng Fan |
Detecting stepping-stone intrusion using association rule mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 6(10), pp. 1225-1235, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Kjell O. Jeppson |
A learning tool MOSFET model: A stepping-stone from the square-law model to BSIM4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: 2013 23rd International Workshop on Power and Timing Modeling, Optimization and Simulation (PATMOS), Karlsruhe, Germany, September 9-11, 2013, pp. 39-44, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Jerome K. Vanclay |
Impact Factor: outdated artefact or stepping-stone to journal certification? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1201.3076, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
29 | Jerome K. Vanclay |
Impact factor: outdated artefact or stepping-stone to journal certification? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 92(2), pp. 211-238, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Kenichi Kourai, Takeshi Azumi, Shigeru Chiba |
A Self-Protection Mechanism against Stepping-Stone Attacks for IaaS Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC/ATC ![In: 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, UIC/ATC 2012, Fukuoka, Japan, September 4-7, 2012, pp. 539-546, 2012, IEEE Computer Society, 978-1-4673-3084-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Yingjie Sheng, Yongzhong Zhang, Jianhua Yang |
Mining Network Traffic Efficiently to Detect Stepping-Stone Intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: IEEE 26th International Conference on Advanced Information Networking and Applications, AINA, 2012 , Fukuoka, Japan, March 26-29, 2012, pp. 862-867, 2012, IEEE Computer Society, 978-1-4673-0714-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Giovanni Di Crescenzo, Abhrajit Ghosh, Abhinay Kampasi, Rajesh Talpade, Yin Zhang |
Detecting Anomalies in Active Insider Stepping Stone Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. ![In: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(1), pp. 103-120, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Han-Ching Wu, Shou-Hsuan Stephen Huang |
Packet-based algorithms for stepping-stone detection with chaff perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 4(4), pp. 436-446, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, David Woolbright |
Correlating TCP/IP Packet contexts to detect stepping-stone intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 30(6-7), pp. 538-546, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Miranda D. Stobbe, Sander M. Houten, Gerbert A. Jansen, Antoine H. C. van Kampen, Perry D. Moerland |
Critical assessment of human metabolic pathway databases: a stepping stone for future integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMC Syst. Biol. ![In: BMC Syst. Biol. 5, pp. 165, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Shou-Hsuan Stephen Huang, Ying-Wei Kuo |
Detecting Chaff Perturbation on Stepping-Stone Connection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 17th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2011, Tainan, Taiwan, December 7-9, 2011, pp. 660-667, 2011, IEEE Computer Society, 978-1-4577-1875-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Lydia Ray, Guoqing Zhao |
Detect Stepping-Stone Insider Attacks by Network Traffic Mining and Dynamic Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011, pp. 151-158, 2011, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Han-Ching Wu, Shou-Hsuan Stephen Huang |
Neural networks-based detection of stepping-stone intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 37(2), pp. 1431-1437, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Jaideep D. Padhye, Kush Kothari, Madhu Venkateshaiah, Matthew K. Wright |
Evading stepping-stone detection under the cloak of streaming media with SNEAK. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 54(13), pp. 2310-2325, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Christopher Hill |
Detect multi-hop stepping-stone pairs with clock skew. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Sixth International Conference on Information Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23-25, 2010, pp. 74-79, 2010, IEEE, 978-1-4244-7407-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Ping Li 0019, Wanlei Zhou 0001, Yanli Yu |
A Quick-Response Real-Time Stepping Stone Detection Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010, 1-3 September 2010, Melbourne, Australia, pp. 677-682, 2010, IEEE, 978-0-7695-4214-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Ping Li 0019, Wanlei Zhou 0001, Yini Wang |
Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 377-382, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Baris Coskun, Nasir D. Memon |
Online Sketching of Network Flows for Real-Time Stepping-Stone Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 473-483, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Byong Lee, Stephen S. H. Huang |
Monitoring Network Traffic to Detect Stepping-Stone Intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, Workshops Proceedings, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 56-61, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Sukanya Manna, Tom Gedeon |
A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 14-20, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Gain of Words, Gain of Sentences, term significance, Information retrieval, summarization, investigation |
29 | Jianhua Yang, Shou-Hsuan Stephen Huang |
Mining TCP/IP packets to detect stepping-stone intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 26(7-8), pp. 479-484, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Yunhyong Kim, Seamus Ross |
Searching for Ground Truth: A Stepping Stone in Automating Genre Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DELOS ![In: Digital Libraries: Research and Development, First International DELOS Conference, Pisa, Italy, February 13-14, 2007, Revised Selected Papers, pp. 248-261, 2007, Springer, 978-3-540-77087-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
automated metadata extraction, digital library, metadata, information extraction, data management, genre classification |
29 | Ting He 0001, Lang Tong |
Detecting Encrypted Interactive Stepping-Stone Connections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP (3) ![In: 2006 IEEE International Conference on Acoustics Speech and Signal Processing, ICASSP 2006, Toulouse, France, May 14-19, 2006, pp. 816-819, 2006, IEEE, 1-4244-0469-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 159 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|