The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for stide with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2009 (8)
Publication types (Num. hits)
article(1) inproceedings(7)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 6 occurrences of 5 keywords

Results
Found 8 publication records. Showing 8 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
199Kymie M. C. Tan, Roy A. Maxion "Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anomaly detector coverage, minimal foreign sequence, stide, performance evaluation, Anomaly detection
72C. V. Raman, Atul Negi A Hybrid Method to Intrusion Detection Systems Using HMM. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Zhuowei Li 0001, Amitabha Das Analyzing and evaluating dynamics in stide performance for intrusion detection. Search on Bibsonomy Knowl. Based Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Yu-Shu Chen, Yi-Ming Chen Combining incremental Hidden Markov Model and Adaboost algorithm for anomaly intrusion detection. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IHMM, anomaly intrusion detection, normal profile, adaboost
24Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood Evolving Buffer Overflow Attacks with Detector Feedback. Search on Bibsonomy EvoWorkshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Hilmi Günes Kayacik, Nur Zincir-Heywood On the Contribution of Preamble to Information Hiding in Mimicry Attacks. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF benchmarking, anomaly detection, Information hiding
24Zhuowei Li 0001, Amitabha Das Visualizing and Identifying Intrusion Context from System Calls Trace. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Christoph C. Michael Finding the Vocabulary of Program Behavior Data for Anomaly Detection. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #8 of 8 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license