The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Intruder with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1995 (16) 1996-1999 (15) 2000 (16) 2001-2002 (39) 2003 (35) 2004 (40) 2005 (47) 2006 (51) 2007 (59) 2008 (66) 2009 (43) 2010 (18) 2011-2012 (28) 2013-2014 (27) 2015 (15) 2016-2017 (29) 2018-2019 (18) 2020 (15) 2021 (18) 2022 (15) 2023 (16) 2024 (3)
Publication types (Num. hits)
article(160) book(1) incollection(1) inproceedings(464) phdthesis(3)
Venues (Conferences, Journals, ...)
CoRR(29) ACC(7) CSFW(7) ESORICS(7) RTA(7) CDC(6) EUROCRYPT(6) ARES(5) Formal Aspects in Security and...(5) ICC(5) SMC(5) ACSAC(4) ICCSA (1)(4) ICRA(4) Int. J. Inf. Sec.(4) IROS(4) More (+10 of total 415)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 387 occurrences of 262 keywords

Results
Found 629 publication records. Showing 629 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Anh-Quynh Nguyen, Yoshiyasu Takefuji Towards an Invisible Honeypot Monitoring System. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Dean A. Jones, Chad E. Davis, Mark A. Turnquist, Linda K. Nozick Physical Security and Vulnerability Modeling for Infrastructure Facilities. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Omar U. Flórez-Choque, Ernesto Cuadros-Vargas A Biologically Motivated Computational Architecture Inspired in the Human Immunological System to Quantify Abnormal Behaviors to Detect Presence of Intruders. Search on Bibsonomy BICC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Abdul Sahid Khan, Madhavan Mukund, S. P. Suresh Generic Verification of Security Protocols. Search on Bibsonomy SPIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Ricardo Corin, Ari Saptawijaya, Sandro Etalle PS-LTL for Constraint-Based Security Protocol Analysis. Search on Bibsonomy ICLP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Tomasz Truderung Regular Protocols and Attacks with Regular Knowledge. Search on Bibsonomy CADE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky Honeypot Forensics, Part II: Analyzing the Compromised Host. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network analysis, honeypots, honeynets
20Xuehou Tan An Optimal Algorithm for the 1-Searchability of Polygonal Rooms. Search on Bibsonomy JCDCG The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Stéphanie Delaune, Florent Jacquemard A Theory of Dictionary Attacks and its Complexity. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Ulrike Meyer, Susanne Wetzel A man-in-the-middle attack on UMTS. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, UMTS, mobile communication, GSM, man-in-the-middle attack
20Mohamed Mejri Chaotic Protocols. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Jan Cederquist, Muhammad Torabi Dashti Formal Analysis of a Fair Payment Protocol. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Hyungwoo Kang, Soon Jwa Hong, Dong Hoon Lee 0001 Matching Connection Pairs. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Connection pairs, Detoured attack, Traceback, Stepping stone, Backdoor
20Sotiris E. Nikoletseas, Grigorios Prasinos, Paul G. Spirakis, Christos D. Zaroliagis Attack Propagation in Networks. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Cas Cremers, Sjouke Mauw Operational Semantics of Security Protocols. Search on Bibsonomy Scenarios: Models, Transformations and Tools The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Mauro Borchardt, Carlos Maziero, Edgard Jamhour An Architecture for On-the-Fly File Integrity Checking. Search on Bibsonomy LADC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano A New Knowledge Representation Strategy for Cryptographic Protocol Analysis. Search on Bibsonomy TACAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Whe Dar Lin Toward a Security EC Transaction on Web. Search on Bibsonomy EC-Web The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Miyoung Kim, Misun Kim, Hyewon K. Lee, Youngsong Mun Design of Active HoneyPot System. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Niv Buchbinder, Erez Petrank Lower and Upper Bounds on Obtaining History Independence. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Scott E. Coull, Joel W. Branch, Boleslaw K. Szymanski, Eric Breimer Intrusion Detection: A Bioinformatics Approach. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion detection, bioinformatics, pattern matching, sequence alignment, masquerade detection
20Salem Benferhat, Fabien Autrel, Frédéric Cuppens Enhanced Correlation in an Intrusion Detection Process. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Iliano Cervesato Data Access Specification and the Most Powerful Symbolic Attacker in MSR. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Jeffrey Van Baalen, Thomas Böhne Automated Protocol Analysis in Maude. Search on Bibsonomy FAABS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph Role Based Specification and Security Analysis of Cryptographic Protocols Using Asynchronous Product Automata. Search on Bibsonomy DEXA Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Thomas Toth, Christopher Krügel Accurate Buffer Overflow Detection via Abstract Payload Execution. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Intrusion Detecion, Buffer Overflow Exploit, Network Security
20David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Sang-Min Park, Jae-Ha Lee, Kyung-Yong Chwa Visibility-Based Pursuit-Evasion in a Polygonal Region by a Searcher. Search on Bibsonomy ICALP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Xuehou Tan Searching a Simple Polygon by a k-Searcher. Search on Bibsonomy ISAAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Florent Jacquemard, Michaël Rusinowitch, Laurent Vigneron Compiling and Verifying Security Protocols. Search on Bibsonomy LPAR The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Kunikazu Yoda, Hiroaki Etoh Finding a Connection Chain for Tracing Intruders. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Daniel Barbará, Rajni Goel, Sushil Jajodia Using Checksums to Detect Data Corruption. Search on Bibsonomy EDBT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Dieter Gollmann Insider Fraud (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Gavin Lowe, A. W. Roscoe 0001 Using CSP to Detect Errors in the TMN Protocol. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF protocol failure, model checking, cryptography, Security protocols, CSP, key establishment, FDR
20Michael K. Reiter, Kenneth P. Birman How to Securely Replicate Services. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF replication, causality, state machines, threshold cryptography
19Priti Mandal, Lakshi Prosad Roy, Santos Kumar Das Accurate Localization of Intruder Drone by UAV Mounted Adaptable Radar Antenna in Restricted Areas. Search on Bibsonomy IEEE Trans. Aerosp. Electron. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Muhammed Fatih Çorapsiz Lifetime maximization of wireless sensor networks while ensuring intruder detection. Search on Bibsonomy Soft Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Illia Zaiets, Vitalii Brydinskyi, Dmytro Sabodashko, Yuriy Khoma, Khrystyna Ruda Integrated System for Speaker Diarization and Intruder Detection using Speaker Embeddings. Search on Bibsonomy CPITS The full citation details ... 2024 DBLP  BibTeX  RDF
19Ilias Belalis, Georgios P. Spathoulas, Ioannis Anagnostopoulos Modeling Intruder Reconnaissance Behavior through State Diagrams to Support Defensive Deception. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Erdi Kara, George Zhang, Joseph J. Williams, Gonzalo Ferrandez-Quinto, Leviticus J. Rhoden, Maximilian Kim, J. Nathan Kutz, Aminur Rahman Deep learning based object tracking in walking droplet and granular intruder experiments. Search on Bibsonomy J. Real Time Image Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su 0001 Privacy-preserving co-synthesis against sensor-actuator eavesdropping intruder. Search on Bibsonomy Autom. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Erdi Kara, George Zhang, Joseph J. Williams, Gonzalo Ferrandez-Quinto, Leviticus J. Rhoden, Maximilian Kim, J. Nathan Kutz, Aminur Rahman Deep Learning Based Object Tracking in Walking Droplet and Granular Intruder Experiments. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Elysia Q. Smyers, Sydney M. Katz, Anthony L. Corso, Mykel J. Kochenderfer AVOIDDS: Aircraft Vision-based Intruder Detection Dataset and Simulator. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Khaled M. Alalayah, Fatma S. Alrayes, Jaber S. Alzahrani, Khadija M. Alaidarous, Ibrahim M. Alwayle, Heba Mohsen, Ibrahim Abdulrab Ahmed, Mesfer Al Duhayyim Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Doron Nussbaum, Fedor Ilitchev Chasing an intruder with limited information. Search on Bibsonomy Int. J. Intell. Robotics Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Peter Padiet, Md. Rafiqul Islam, M. Arif Khan Analysis of Malicious Intruder Threats to Data Integrity. Search on Bibsonomy ACR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Jun Yong Eom, Seok Un Jang, Wha Sook Jeon Wi-Sniffer: Wifi-based intruder detection system using deep learning and decision tree. Search on Bibsonomy VTC2023-Spring The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Suryansh Sharma, Prabhakar Venkata Tamma, Shalakha Singhal, Gogineni Gopi Sunanth Kumar, R. Venkatesha Prasad B4W: A Smart Wireless Intruder Detection System. Search on Bibsonomy ICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Amirmohammad Pasdar, Young Choon Lee, Seok-Hee Hong 0001 Catch the Intruder: Collaborative and Personalized Malware Detection By On-Device Application Fingerprinting. Search on Bibsonomy ICWS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Shivam Kainth, Subham Sahoo, Rajtilak Pal, Shashi Shekhar Jha Chasing the Intruder: A Reinforcement Learning Approach for Tracking Unidentified Drones. Search on Bibsonomy AIR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Uihwan Choi, Soojeon Lee Optimization of collision-free trajectories for advanced air mobility under risk of a non-cooperative intruder. Search on Bibsonomy ICTC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Elysia Q. Smyers, Sydney M. Katz, Anthony Corso 0001, Mykel J. Kochenderfer AVOIDDS: Aircraft Vision-based Intruder Detection Dataset and Simulator. Search on Bibsonomy NeurIPS The full citation details ... 2023 DBLP  BibTeX  RDF
19Muhammad Syafiq Mohd Zainordin, Sharifah Saon, Abd Kadir Mahamad, Nurhanna Umairah Khuzairi, Mohd Anuaruddin Bin Ahmadon, Shingo Yamaguchi Intruder Motion Detection with Notification System. Search on Bibsonomy GCCE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Anton Bernshteyn, Eugene Lee Searching for an Intruder on Graphs and Their Subdivisions. Search on Bibsonomy Electron. J. Comb. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Sufal Chandra Swar, Suresh Manickam, David W. Casbeer, Krishna Kalyanam, Swaroop Darbha Optimal Autonomous Pursuit of an Intruder on a Grid Aided by Local Node and Edge Sensors. Search on Bibsonomy Unmanned Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Antonella Barisic, Frano Petric, Stjepan Bogdan Brain over Brawn: Using a Stereo Camera to Detect, Track, and Intercept a Faster UAV by Reconstructing the Intruder's Trajectory. Search on Bibsonomy Field Robotics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Badr Lahasan, Hussein Samma Optimized Deep Autoencoder Model for Internet of Things Intruder Detection. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Pubali De, Amitava Chatterjee, Anjan Rakshit PIR-Sensor-Based Surveillance Tool for Intruder Detection in Secured Environment: A Label-Consistency-Based Modified Sequential Dictionary Learning Approach. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Izlian Yolanda Orea-Flores, Mario E. Rivero-Angeles, Ana L. Onofre-Soto, Edna G. Azpeitia-Rebollar, Noé Torres-Cruz, Iclia Villordo-Jimenez, Angel Pretelín-Ricárdez, Rolando Menchaca-Méndez Teletraffic analysis of energy-efficient intruder detection using hash function techniques in images for remote monitoring in Wireless Sensor Networks. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Justin M. Kennedy, Jason J. Ford, Daniel E. Quevedo Bayesian Quickest Change Detection of an Intruder in Acknowledgments for Private Remote State Estimation. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Adam B. Haywood, Brian J. Lunday, Matthew J. Robbins, Meir Pachter The weighted intruder path covering problem. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Hai Zhang, Gengzhe Fu, Yongzhang Su, Yixin Yue, Wei Zhu, Chenyu Zhang, Yuxiang Lu Safety Study of High-Speed Collisions between Trains and Live Intruder. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Raunak Srivastava, Rolif Lima, Kaushik Das Aerial Interception of Non-Cooperative Intruder using Model Predictive Control. Search on Bibsonomy ACC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Young-Il Kim, Park Seong Hee, Tae-Wook Heo, Tae-Chong Lee, Yong-Hyun Yeun, Seung-Tae Kim Performance Analysis of Geo-Fencing Effect for Intruder Monitoring. Search on Bibsonomy CSCI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Paniti Netinant, Auttapon Amatyakul, Meennapa Rukhiran Alert Intruder Detection System Using Passive Infrared Motion Detector based on Internet of Things. Search on Bibsonomy ICSIM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Mohtasin Golam, Rubina Akter, Revin Naufal Alief, Van-Sang Doan, Jae-Min Lee, Dong-Seong Kim 0002 Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things. Search on Bibsonomy MILCOM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Justin M. Kennedy, Jason J. Ford, Daniel E. Quevedo Bayesian Quickest Change Detection of an Intruder in Acknowledgments for Private Remote State Estimation. Search on Bibsonomy ANZCC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Mrunalini Nalamati, Muhammad Saqib, Nabin Sharma, Michael Blumenstein Exploring Transformers for Intruder Detection in Complex Maritime Environment. Search on Bibsonomy AI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Milda Zaliauskaite Role of ruler or intruder? Patient's right to autonomy in the age of innovation and technologies. Search on Bibsonomy AI Soc. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Prasanta Kumar Jena, Subhojit Ghosh, Ebha Koley Design of a coordinated cyber-physical attack in IoT based smart grid under limited intruder accessibility. Search on Bibsonomy Int. J. Crit. Infrastructure Prot. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Daniel H. Stolfi, Matthias R. Brust, Grégoire Danoy, Pascal Bouvry CONSOLE: intruder detection using a UAV swarm and security rings. Search on Bibsonomy Swarm Intell. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Edmond Nurellari, Daniel Bonilla Licea, Mounir Ghogho, Mario Eduardo Rivero-Angeles On Trajectory Design for Intruder Detection in Wireless Mobile Sensor Networks. Search on Bibsonomy IEEE Trans. Signal Inf. Process. over Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Wasana Boonsong, Oluseye Adeleke, Widad Ismail Accuracy Performance Analysis of Safety Sensors Based NETPIE-Intruder Detection System on Internet of Things Platform. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Elijah S. Lee, Daigo Shishika, Giuseppe Loianno, Vijay Kumar 0001 Defending a Perimeter from a Ground Intruder Using an Aerial Defender: Theory and Practice. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su 0001 Privacy-Preserving Co-synthesis Against Sensor-Actuator Eavesdropping Intruder. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Maximilian Mozes, Bennett Kleinberg No Intruder, no Validity: Evaluation Criteria for Privacy-Preserving Text Anonymization. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Gauri Kalnoor, S. Gowrishankar Internet of Things (IoT) based Network Integrated with Sensor Nodes for Intruder Detection and Low Energy Consumption. Search on Bibsonomy J. Ubiquitous Syst. Pervasive Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Pawel Rzucidlo, Grzegorz Jaromi, Tomasz Kapuscinski, Damian Kordos, Tomasz Rogalski, Piotr Szczerba In-Flight Tests of Intruder Detection Vision System. Search on Bibsonomy Sensors The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Elijah S. Lee, Daigo Shishika, Giuseppe Loianno, Vijay Kumar 0001 Defending a Perimeter from a Ground Intruder Using an Aerial Defender: Theory and Practice. Search on Bibsonomy SSRR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Sheeba Armoogum, Nawaz Mohamudally 0001 A Novel Prevention Technique Using Deep Analysis Intruder Tracing with a Bottom-Up Approach Against Flood Attacks in VoIP Systems. Search on Bibsonomy ICO The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Pavel Záviska, Petr Dejdar, Petr Münster Comparison of image edge detection methods for intruder detection in a phase-sensitive OTDR system. Search on Bibsonomy ICUMT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Vipa Thananant, Chumpol Mokarat An IoT Based Intruder and Smoke Monitoring System. Search on Bibsonomy ICCAI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19R. C. P. D. Peiris, R. Tharmikka, H. M. V. R. Herath, Maheshi B. Dissanayake, M. A. U. S. Navaratne Intruder Detection System Through Walking Pattern Analysis for Home Security. Search on Bibsonomy ICIIS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Jiahong Xu, Xiaofeng Liu 0006, Xu Zhou, Huan Wang 0012, Qiguang Lin Planning strategy for intruder agent based on game theory and artificial potential field. Search on Bibsonomy RCAR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Anik Alvi, Tarem Ahmed, Mohammad Faisal Uddin Comparative Study of Traditional Techniques for Unsupervised Autonomous Intruder Detection. Search on Bibsonomy AINA (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Cristino De Souza Junior Hunter drones : drones cooperation for tracking an intruder drone. (Drones en coopération pour la poursuite d'un drone intrus). Search on Bibsonomy 2021   RDF
19Elijah S. Lee, Daigo Shishika, Vijay Kumar 0001 Perimeter-defense Game between Aerial Defender and Ground Intruder. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Alireza Partovi, Taeho Jung, Hai Lin 0002 Opacity of Discrete Event Systems with Active Intruder. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Mashnoon Islam, Touhid Ahmed, Abu Tammam Bin Nuruddin, Mashuda Islam, Shahnewaz Siddique Autonomous Intruder Detection Using a ROS-Based Multi-Robot System Equipped with 2D-LiDAR Sensors. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Pramuditha Perera, Julian Fiérrez, Vishal M. Patel 0001 Quickest Intruder Detection for Multiple User Active Authentication. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Animesh Chakravarthy, Debasish Ghose Cooperative Pursuit Guidance to Surround Intruder Swarms Using Collision Cones. Search on Bibsonomy J. Aerosp. Inf. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Lamia Hamza Intruder model for generating attack scenarios in computer systems. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Mashnoon Islam, Touhid Ahmed, Abu Tammam Bin Nuruddin, Mashuda Islam, Shahnewaz Siddique Autonomous Intruder Detection Using a ROS-Based Multi-Robot System Equipped with 2D-LiDAR Sensors. Search on Bibsonomy SSRR The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Pramuditha Perera, Julian Fiérrez, Vishal M. Patel 0001 Quickest Intruder Detection For Multiple User Active Authentication. Search on Bibsonomy ICIP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Daniel H. Stolfi, Matthias R. Brust, Grégoire Danoy, Pascal Bouvry Optimizing the Performance of an Unpredictable UAV Swarm for Intruder Detection. Search on Bibsonomy OLA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Rajnish Bhusal, Baris Taner, Kamesh Subbarao On the Phase Margin of Networked Dynamical Systems and Fabricated Attacks of an Intruder. Search on Bibsonomy ACC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Elijah S. Lee, Daigo Shishika, Vijay Kumar 0001 Perimeter-defense Game between Aerial Defender and Ground Intruder. Search on Bibsonomy CDC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Miguel Angel Quiroz Martinez, Deivid Temistocles Leon Rugel, Carlos Jose Espinoza Alcivar, Maikel Yelandi Leyva Vazquez A Framework for Selecting Classification Models in the Intruder Detection System Using TOPSIS. Search on Bibsonomy IHIET (Paris) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Daniel H. Stolfi, Matthias R. Brust, Grégoire Danoy, Pascal Bouvry Competitive Evolution of a UAV Swarm for Improving Intruder Detection Rates. Search on Bibsonomy IPDPS Workshops The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 629 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license