Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Eray Balkanli, Jander Alves, Nur Zincir-Heywood |
Supervised learning to detect DDoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 50-57, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Shahbar, Nur Zincir-Heywood |
Benchmarking two techniques for Tor classification: Flow level and circuit level classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 58-65, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Obermeier 0001, Michael Wahler, Thanikesavan Sivanthi, Roman Schlegel, Aurelien Monot |
Automatic attack surface reduction in next-generation industrial control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 42-49, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Foaad Khosmood, Phillip L. Nico, Jonathan Woolery |
User identification through command history analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 19-25, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohiuddin Solaimani, Mohammed Iftekhar, Latifur Khan, Bhavani Thuraisingham, Joey Burton Ingram |
Spark-based anomaly detection over multi-source VMware performance data in real-time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 66-73, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ugur Pehlivan, Nuray Baltaci, Cengiz Acartürk, Nazife Baykal |
The analysis of feature selection methods and classification algorithms in permission based Android malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 81-88, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | El-Sayed M. El-Alfy, Ali A. Al-Hasan |
A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 89-95, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Carlos A. S. Assis, Adriano César Machado Pereira, Marconi de Arruda Pereira, Eduardo G. Carrano |
A genetic programming approach for fraud detection in electronic transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 96-103, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![IEEE, 978-1-4799-4522-1 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Arisoa S. Randrianasolo, Larry D. Pyeatt |
A theoretical Q-learning temporary security repair. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 74-80, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili 0001 |
Quantifying the impact of unavailability in cyber-physical environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 26-33, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Karel P. Bergmann, Jörg Denzinger |
Automated testing for cyber threats to ad-hoc wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 34-41, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dipankar Dasgupta, Denise Ferebee, Sanjib Kumar Saha, Abhijit Kumar Nag, Kul Prasad Subedi, Alvaro Madero, Abel Sanchez, John R. Williams |
G-NAS: A grid-based approach for negative authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 9-18, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | El-Sayed M. El-Alfy, Asem A. Ghaleb |
Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 1-8, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hossein Rahimi, Nur Zincir-Heywood, Bharat Gadher |
Indoor geo-fencing and access control for wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 1-8, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kesav Kancherla, Srinivas Mukkamala |
Image visualization based malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 40-44, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sanjay Rawat 0001, Fabien Duchene, Roland Groz, Jean-Luc Richier |
Evolving indigestible codes: Fuzzing interpreters with genetic programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 37-39, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![IEEE, 978-1-4673-5867-5 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Hector M. Lugo-Cordero, Ratan K. Guha |
What defines an intruder? An intelligent approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 31-36, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mahendra Piraveenan, Shahadat Uddin, Kon Shing Kenneth Chung, Dharshana Kasthurirathna |
Quantifying encircling behaviour in complex networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 9-14, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marcos Álvares Barbosa Junior, Tshilidzi Marwala, Fernando Buarque de Lima Neto |
Applications of computational intelligence for static software checking against memory corruption vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 59-66, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Simon Miller, Jonathan M. Garibaldi, Susan Appleby |
Evolving OWA operators for cyber security decision making problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 15-22, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | S. Ganesh Babu, Ilango Paramasivam |
Higher dimensional chaos for Audio encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 52-58, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta |
Resilient hybrid overlay model for smart grid: RHM for smart grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 45-51, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chirag Modi 0001, Dhiren R. Patel |
A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 23-30, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Robert K. Abercrombie, Erik M. Ferragut, Frederick T. Sheldon, Michael R. Grimaila |
Addressing the need for independence in the CSE model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 68-75, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Scott Musman, Mike Tanner, Aaron Temin, Evan Elsaesser, Lewis Loren |
A systems engineering approach for crown jewels estimation and mission assurance decision making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 210-216, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | |
2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![IEEE, 978-1-4244-9904-5 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Anita Zakrzewska, Erik M. Ferragut |
Modeling cyber conflicts using an extended Petri Net formalism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 60-67, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Erik M. Ferragut, David M. Darmon, Craig Aaron Shue, Stephen Kelley |
Automatic construction of anomaly detectors from graphical models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 9-16, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ran Liu, Wenjian Luo, Xufa Wang |
A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 31-38, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Justin M. Beaver, Robert M. Patton, Thomas E. Potok |
An approach to the automated determination of host information value. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 92-99, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Amal Ben Hamida, Mohamed Koubàa, Chokri Ben Amar, Henri Nicolas |
Hierarchical traceability of multimedia documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 108-113, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yi Hu, Charles E. Frank, James Walden, Emily Crawford, Dhanuja Kasturiratna |
Profiling file repository access patterns for identifying data exfiltration activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 122-128, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Paul K. Harmer, Ryan W. Thomas, Brady Christel, Richard K. Martin, Clifton Watson |
Wireless security situation awareness with attack identification decision support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 144-151, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | James L. Miller, Robert F. Mills, Michael R. Grimaila, Michael W. Haas |
A scalable architecture for improving the timeliness and relevance of cyber incident notifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 76-83, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Justin Zhan, Xing Fang, Peter Killion |
Trust optimization in task-oriented social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 137-143, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Omar Al-Ibrahim, Suku Nair |
Security fusion based on state machine compositions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 39-46, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Harkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva |
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 129-136, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stephen M. Woskov, Michael R. Grimaila, Robert F. Mills, Michael W. Haas |
Design considerations for a case-based reasoning engine for scenario-based cyber incident notification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 84-91, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dean Lee, Samuel N. Hamilton, Wendy L. Hamilton |
Modeling Cyber Knowledge uncertainty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 25-30, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sara Hajian, Josep Domingo-Ferrer, Antoni Martínez-Ballesté |
Discrimination prevention in data mining for intrusion and crime detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 47-54, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Martin Rehák, Jan Stiborek, Martin Grill |
Intelligence, not integration: Distributed regret minimization for IDS Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 217-224, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Senhua Yu, Dipankar Dasgupta |
An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 17-24, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Justin Zhan, Lijo Thomas |
Phishing detection using stochastic learning-based weak estimators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 55-59, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Justin Zhan, Xing Fang, Naveen Bandaru |
Location privacy protection on social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 160-163, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jennifer T. Jackson, Sadie Creese, Mark S. Leeson |
Biodiversity: A security approach for ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 186-193, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David L. Hancock, Gary B. Lamont |
Multi agent systems on military networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 100-107, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi, Sukumar Nandi |
A host based DES approach for detecting ARP spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 114-121, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, Qishi Wu |
Security visualization: Cyber security storm map and event correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 171-178, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Bacquet, Nur Zincir-Heywood, Malcolm I. Heywood |
Genetic optimization and hierarchical clustering applied to encrypted traffic identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 194-201, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Patrick LaRoche, Nur Zincir-Heywood, Malcolm I. Heywood |
Exploring the state space of an application protocol: A case study of SMTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 152-159, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ondrej Linda, Milos Manic, Todd Vollmer, Jason L. Wright |
Fuzzy logic based anomaly detection for embedded network security cyber sensor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 202-209, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Todd Vollmer, Jim Alves-Foss, Milos Manic |
Autonomous rule creation for intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 1-8, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Masanoei Hara, Akira Yamada 0001, Yutaka Miyake |
Visual similarity-based phishing detection without victim site information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 30-36, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hoin Kim, Inyong Lee, Jaeik Cho, Jongsub Moon |
Visualization of network components for attack analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 1-8, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, Steven K. Rogers |
Using qualia and multi-layered relationships in malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 91-98, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Suvasini Panigrahi, Shamik Sural, Arun K. Majumdar |
Detection of intrusive activity in databases by combining multiple evidences and belief update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 83-90, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Qishi Wu, Denise Ferebee, Yunyue Lin, Dipankar Dasgupta |
Visualization of security events using an efficient correlation technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 61-68, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Eric S. Imsand, Deon Garrett, John A. Hamilton Jr. |
User identification using GUI manipulation patterns and artificial neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 130-135, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Li Yang 0001, Feiqiong Liu, Joseph M. Kizza, Raimund K. Ege |
Discovering topics from dark websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 175-179, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Joseph A. Brown, Sheridan K. Houghten, Beatrice M. Ombuki-Berman |
Genetic algorithm cryptanalysis of a substitution permutation network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 115-121, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nikolaos Chatzis, Radu Popescu-Zeletin, Nevil Brownlee |
Email worm detection by wavelet analysis of DNS query streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 53-60, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Dipankar Dasgupta |
Tutorial: computational intelligence in cyber security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka |
Generating mimicry attacks using genetic programming: A benchmarking study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 136-143, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | |
2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![IEEE, 978-1-4244-2769-7 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Siddharth Gujral, Estefan Ortiz, Vassilis L. Syrmos |
An unsupervised method for intrusion detection using spectral clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 99-106, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sourour Meharouech, Adel Bouhoula, Tarek Abbes |
Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 107-114, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Eric M. Holloway, Gary B. Lamont, Gilbert L. Peterson |
Network security using self organized multi agent swarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 144-151, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Chet Langin, Hongbo Zhou 0001, Shahram Rahimi 0001, Bidyut Gupta, Mehdi R. Zargham, Mohammad R. Sayeh |
A self-organizing map and its modeling for discovering malignant network traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 122-129, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Torri, Winard Britt, John A. Hamilton Jr. |
A compiler classification framework for use in reverse engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 159-166, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Bian 0001, Remzi Seker |
JigDFS: A secure distributed file system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 76-82, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Manhyun Chung, Jaeik Cho, Jongsub Moon |
An effective denial of service detection method using kernel based data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 9-12, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Archana Bhattarai, Vasile Rus, Dipankar Dasgupta |
Characterizing comment spam in the blogosphere through content analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 37-44, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Minsoo Lee, Xiaohui Ye, Samuel D. Johnson, Dan Marconett, Chaitanya S. K. Vadrevu, Rao Vemuri 0001, S. J. Ben Yoo |
Cognitive security management with reputation based cooperation schemes in heterogeneous networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 19-23, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili 0001 |
Managing complex IT security processes with value based measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 69-75, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ran Tao, Li Yang 0001, Lu Peng 0001, Bin Li 0008, Alma Cemerlic |
A case study: Using architectural features to improve sophisticated denial-of-service attack detections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 13-18, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Riyad Alshammari, Nur Zincir-Heywood |
Generalization of signatures for SSH encrypted traffic identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 167-174, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ochul Kwon, Seongjae Bae, Jaeik Cho, Jongsub Moon |
Study of fuzzy clustering methods for malicious codes using native API call frequency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 24-29, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sahin Renckes, Huseyin Polat 0001, Yusuf Oysal |
Finding the state sequence maximizing P(O; I|λ) on distributed HMMs with Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 152-158, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rajesh Kumar Pal, Indranil Sengupta 0001 |
Enhancing file data security in linux operating system by integrating secure file system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 45-52, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|