The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CICS"( http://dblp.L3S.de/Venues/CICS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cics

Publication years (Num. hits)
2009 (27) 2011 (29) 2013 (11) 2014 (14)
Publication types (Num. hits)
inproceedings(77) proceedings(4)
Venues (Conferences, Journals, ...)
CICS(81)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 81 publication records. Showing 81 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Eray Balkanli, Jander Alves, Nur Zincir-Heywood Supervised learning to detect DDoS attacks. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Khalid Shahbar, Nur Zincir-Heywood Benchmarking two techniques for Tor classification: Flow level and circuit level classification. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sebastian Obermeier 0001, Michael Wahler, Thanikesavan Sivanthi, Roman Schlegel, Aurelien Monot Automatic attack surface reduction in next-generation industrial control systems. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Foaad Khosmood, Phillip L. Nico, Jonathan Woolery User identification through command history analysis. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohiuddin Solaimani, Mohammed Iftekhar, Latifur Khan, Bhavani Thuraisingham, Joey Burton Ingram Spark-based anomaly detection over multi-source VMware performance data in real-time. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ugur Pehlivan, Nuray Baltaci, Cengiz Acartürk, Nazife Baykal The analysis of feature selection methods and classification algorithms in permission based Android malware detection. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1El-Sayed M. El-Alfy, Ali A. Al-Hasan A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Carlos A. S. Assis, Adriano César Machado Pereira, Marconi de Arruda Pereira, Eduardo G. Carrano A genetic programming approach for fraud detection in electronic transactions. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014 Search on Bibsonomy CICS The full citation details ... 2014 DBLP  BibTeX  RDF
1Arisoa S. Randrianasolo, Larry D. Pyeatt A theoretical Q-learning temporary security repair. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili 0001 Quantifying the impact of unavailability in cyber-physical environments. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Karel P. Bergmann, Jörg Denzinger Automated testing for cyber threats to ad-hoc wireless networks. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dipankar Dasgupta, Denise Ferebee, Sanjib Kumar Saha, Abhijit Kumar Nag, Kul Prasad Subedi, Alvaro Madero, Abel Sanchez, John R. Williams G-NAS: A grid-based approach for negative authentication. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1El-Sayed M. El-Alfy, Asem A. Ghaleb Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study. Search on Bibsonomy CICS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hossein Rahimi, Nur Zincir-Heywood, Bharat Gadher Indoor geo-fencing and access control for wireless networks. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kesav Kancherla, Srinivas Mukkamala Image visualization based malware detection. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sanjay Rawat 0001, Fabien Duchene, Roland Groz, Jean-Luc Richier Evolving indigestible codes: Fuzzing interpreters with genetic programming. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore Search on Bibsonomy CICS The full citation details ... 2013 DBLP  BibTeX  RDF
1Hector M. Lugo-Cordero, Ratan K. Guha What defines an intruder? An intelligent approach. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mahendra Piraveenan, Shahadat Uddin, Kon Shing Kenneth Chung, Dharshana Kasthurirathna Quantifying encircling behaviour in complex networks. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marcos Álvares Barbosa Junior, Tshilidzi Marwala, Fernando Buarque de Lima Neto Applications of computational intelligence for static software checking against memory corruption vulnerabilities. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Simon Miller, Jonathan M. Garibaldi, Susan Appleby Evolving OWA operators for cyber security decision making problems. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1S. Ganesh Babu, Ilango Paramasivam Higher dimensional chaos for Audio encryption. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta Resilient hybrid overlay model for smart grid: RHM for smart grid. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chirag Modi 0001, Dhiren R. Patel A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Robert K. Abercrombie, Erik M. Ferragut, Frederick T. Sheldon, Michael R. Grimaila Addressing the need for independence in the CSE model. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Scott Musman, Mike Tanner, Aaron Temin, Evan Elsaesser, Lewis Loren A systems engineering approach for crown jewels estimation and mission assurance decision making. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011 Search on Bibsonomy CICS The full citation details ... 2011 DBLP  BibTeX  RDF
1Anita Zakrzewska, Erik M. Ferragut Modeling cyber conflicts using an extended Petri Net formalism. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Erik M. Ferragut, David M. Darmon, Craig Aaron Shue, Stephen Kelley Automatic construction of anomaly detectors from graphical models. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ran Liu, Wenjian Luo, Xufa Wang A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Justin M. Beaver, Robert M. Patton, Thomas E. Potok An approach to the automated determination of host information value. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amal Ben Hamida, Mohamed Koubàa, Chokri Ben Amar, Henri Nicolas Hierarchical traceability of multimedia documents. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yi Hu, Charles E. Frank, James Walden, Emily Crawford, Dhanuja Kasturiratna Profiling file repository access patterns for identifying data exfiltration activities. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Paul K. Harmer, Ryan W. Thomas, Brady Christel, Richard K. Martin, Clifton Watson Wireless security situation awareness with attack identification decision support. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1James L. Miller, Robert F. Mills, Michael R. Grimaila, Michael W. Haas A scalable architecture for improving the timeliness and relevance of cyber incident notifications. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Justin Zhan, Xing Fang, Peter Killion Trust optimization in task-oriented social networks. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Omar Al-Ibrahim, Suku Nair Security fusion based on state machine compositions. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Harkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stephen M. Woskov, Michael R. Grimaila, Robert F. Mills, Michael W. Haas Design considerations for a case-based reasoning engine for scenario-based cyber incident notification. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dean Lee, Samuel N. Hamilton, Wendy L. Hamilton Modeling Cyber Knowledge uncertainty. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sara Hajian, Josep Domingo-Ferrer, Antoni Martínez-Ballesté Discrimination prevention in data mining for intrusion and crime detection. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martin Rehák, Jan Stiborek, Martin Grill Intelligence, not integration: Distributed regret minimization for IDS Control. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Senhua Yu, Dipankar Dasgupta An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Justin Zhan, Lijo Thomas Phishing detection using stochastic learning-based weak estimators. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Justin Zhan, Xing Fang, Naveen Bandaru Location privacy protection on social networks. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jennifer T. Jackson, Sadie Creese, Mark S. Leeson Biodiversity: A security approach for ad hoc networks. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1David L. Hancock, Gary B. Lamont Multi agent systems on military networks. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi, Sukumar Nandi A host based DES approach for detecting ARP spoofing. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, Qishi Wu Security visualization: Cyber security storm map and event correlation. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Carlos Bacquet, Nur Zincir-Heywood, Malcolm I. Heywood Genetic optimization and hierarchical clustering applied to encrypted traffic identification. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Patrick LaRoche, Nur Zincir-Heywood, Malcolm I. Heywood Exploring the state space of an application protocol: A case study of SMTP. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ondrej Linda, Milos Manic, Todd Vollmer, Jason L. Wright Fuzzy logic based anomaly detection for embedded network security cyber sensor. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Todd Vollmer, Jim Alves-Foss, Milos Manic Autonomous rule creation for intrusion detection. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Masanoei Hara, Akira Yamada 0001, Yutaka Miyake Visual similarity-based phishing detection without victim site information. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hoin Kim, Inyong Lee, Jaeik Cho, Jongsub Moon Visualization of network components for attack analysis. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, Steven K. Rogers Using qualia and multi-layered relationships in malware detection. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Suvasini Panigrahi, Shamik Sural, Arun K. Majumdar Detection of intrusive activity in databases by combining multiple evidences and belief update. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Qishi Wu, Denise Ferebee, Yunyue Lin, Dipankar Dasgupta Visualization of security events using an efficient correlation technique. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Eric S. Imsand, Deon Garrett, John A. Hamilton Jr. User identification using GUI manipulation patterns and artificial neural networks. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Li Yang 0001, Feiqiong Liu, Joseph M. Kizza, Raimund K. Ege Discovering topics from dark websites. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joseph A. Brown, Sheridan K. Houghten, Beatrice M. Ombuki-Berman Genetic algorithm cryptanalysis of a substitution permutation network. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nikolaos Chatzis, Radu Popescu-Zeletin, Nevil Brownlee Email worm detection by wavelet analysis of DNS query streams. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dipankar Dasgupta Tutorial: computational intelligence in cyber security. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka Generating mimicry attacks using genetic programming: A benchmarking study. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009 Search on Bibsonomy CICS The full citation details ... 2009 DBLP  BibTeX  RDF
1Siddharth Gujral, Estefan Ortiz, Vassilis L. Syrmos An unsupervised method for intrusion detection using spectral clustering. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sourour Meharouech, Adel Bouhoula, Tarek Abbes Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Eric M. Holloway, Gary B. Lamont, Gilbert L. Peterson Network security using self organized multi agent swarms. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Chet Langin, Hongbo Zhou 0001, Shahram Rahimi 0001, Bidyut Gupta, Mehdi R. Zargham, Mohammad R. Sayeh A self-organizing map and its modeling for discovering malignant network traffic. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Stephen Torri, Winard Britt, John A. Hamilton Jr. A compiler classification framework for use in reverse engineering. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jiang Bian 0001, Remzi Seker JigDFS: A secure distributed file system. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Manhyun Chung, Jaeik Cho, Jongsub Moon An effective denial of service detection method using kernel based data. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Archana Bhattarai, Vasile Rus, Dipankar Dasgupta Characterizing comment spam in the blogosphere through content analysis. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Minsoo Lee, Xiaohui Ye, Samuel D. Johnson, Dan Marconett, Chaitanya S. K. Vadrevu, Rao Vemuri 0001, S. J. Ben Yoo Cognitive security management with reputation based cooperation schemes in heterogeneous networks. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili 0001 Managing complex IT security processes with value based measures. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ran Tao, Li Yang 0001, Lu Peng 0001, Bin Li 0008, Alma Cemerlic A case study: Using architectural features to improve sophisticated denial-of-service attack detections. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Riyad Alshammari, Nur Zincir-Heywood Generalization of signatures for SSH encrypted traffic identification. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ochul Kwon, Seongjae Bae, Jaeik Cho, Jongsub Moon Study of fuzzy clustering methods for malicious codes using native API call frequency. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sahin Renckes, Huseyin Polat 0001, Yusuf Oysal Finding the state sequence maximizing P(O; I|λ) on distributed HMMs with Privacy. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rajesh Kumar Pal, Indranil Sengupta 0001 Enhancing file data security in linux operating system by integrating secure file system. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #81 of 81 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license