The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "MMM-ACNS"( http://dblp.L3S.de/Venues/MMM-ACNS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/mmmacns

Publication years (Num. hits)
2001 (29) 2003 (48) 2005 (43) 2010 (28) 2012 (27) 2017 (29)
Publication types (Num. hits)
inproceedings(199) proceedings(5)
Venues (Conferences, Journals, ...)
MMM-ACNS(204)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 62 occurrences of 56 keywords

Results
Found 204 publication records. Showing 204 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Félix J. García Clemente, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta An XML-Seamless Policy Based Management Framework. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Igor V. Kotenko, Mikhail Stepashkin Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo Secure Protected Password Change Scheme. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptography, Key agreement, Password authentication
1Alexander A. Grusho, Alexander Kniazev, Elena E. Timonina Detection of Illegal Information Flow. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Douglas H. Summerville, Victor A. Skormin, Alexander Volynkin, James Moronski Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Udo Payer, Peter Teufl, Stefan Kraxberger, Mario Lamberger Massive Data Mining for Polymorphic Code Detection. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ernö Jeges, Zoltán Hornák, Csaba Körmöczi Encoding Private Key in Fingerprint. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Victor Serdiouk Behavior-Based Model of Detection and Prevention of Intrusions in Computer Networks. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin Developing an Insider Threat Model Using Functional Decomposition. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yonggen Gu, Yuxi Fu, Farong Zhong, Han Zhu A Generic Model for Analyzing Security Protocols. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Abdulrahman Alharby, Hideki Imai Hybrid Intrusion Detection Model Based on Ordered Sequences. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF continuous pattern, discontinuous pattern, data mining, intrusion detection
1Naranker Dulay, Emil C. Lupu, Morris Sloman, Joe Sventek, Nagwa L. Badr, Steven Heeps Self-managed Cells for Ubiquitous Systems. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Danièle Beauquier, Marie Duflot, Marius Minea A Probabilistic Property-Specific Approach to Information Flow. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Soomi Yang An Efficient Access Control Model Utilized the Attribute Certificate Structuring. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin Vulnerabilities Detection in the Configurations of MS Windows Operating System. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Slim Rekhis, Noureddine Boudriga A Temporal Logic-Based Model for Forensic Investigation in Networked System Security. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov, Alexander Ulanov Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Alexander O. Tarakanov, Sergei V. Kvachev, Alexander V. Sukhorukov A Formal Immune Network and Its Implementation for On-line Intrusion Detection. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Vipin Swarup, Sushil Jajodia, Joseph Pamula Rule-Based Topological Vulnerability Analysis. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Fabrizio Baiardi, Claudio Telmon A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Wojciech Molisz, Jacek Rak Region Protection/Restoration Scheme in Survivable Networks. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Philippe Balbiani, Fahima Cheikh Safety Problems in Access Control with Temporal Constraints. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Gang Yin, Huaimin Wang, Dian-xi Shi, Haiya Gu Towards More Controllable and Practical Delegation. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Roberto Giacobazzi, Isabella Mastroeni Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen Foundation for a Time Interval Access Control Model. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Chin A Modal Logic for Role-Based Access Control. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Joseph E. Johnson Networks, Markov Lie Monoids, and Generalized Entropy. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mohamed Al-Ibrahim A Signcryption Scheme Based on Secret Sharing Technique. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Hyun-Sung Kim, Sung-Ho Hwang Multiplier for Public-Key Cryptosystem Based on Cellular Automata. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Taeshik Shon, Taewoo Noh, Jongsub Moon Support Vector Machine Based ICMP Covert Channel Attack Detection. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ruben Wolf, Markus Schneider 0002 Context-Dependent Access Control for Web-Based Collaboration Environments with Role-based Approach. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Vladimir Gorodetsky, Vladimir Samoilov Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Valery I. Korzhik, Guillermo Morales-Luna, Irina Marakova, Carlos Patiño-Ruvalcaba Digital Watermarking under a Filtering and Additive Noise Attack Condition. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Correlation Detector, White and Colored Additive Noise, Watermark, Error Probability, Linear Filtering
1Lilian Mitrou, Konstantinos Moulinos Privacy and Data Protection in Electronic Communications. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Svetlana P. Sokolova, Ruslan S. Ivlev Computer Immunology System with Variable Configuration. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cytokines networks, interval mathematics model, interval stability and robustness, intrusion detection
1Ruo Ando, Yoshiyasu Takefuji Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Francisco J. Martín, Enric Plaza Alert Triage on the ROC. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Valery I. Korzhik, Viktor Yakovlev, Alexander Sinuk Achievability of the Key-Capacity in a Scenario of Key Sharing. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Wire-tap channel, public discussion, key capacity, privacy amplification, Renyi entropy
1Steve Barker Distributed Access Control: A Logic-Based Approach. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Alexander A. Grusho, Elena E. Timonina Construction of the Covert Channels. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Mohamed Al-Ibrahim, Anton Cerný Authentication of Anycast Communication. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, proxy signature, Anycast
1Xinpeng Zhang 0001, Shuozhong Wang, Kaiwen Zhang 0002 Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Nicolas Sklavos 0001, Alexander A. Moldovyan, Odysseas G. Koufopavlou Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF DDP Transformations, CIKS-1, Block Cipher, Hardware Implementations, SPECTR-H64
1John Bigham, David Gamez, Ning Lu Safeguarding SCADA Systems with Anomaly Detection. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Salem Benferhat, Fabien Autrel, Frédéric Cuppens Enhanced Correlation in an Intrusion Detection Process. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Nick D. Goots, Boris V. Izotov, Alexander A. Moldovyan, Nick A. Moldovyan Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Data-Dependent Permutations, SPECTR-H64, Differential Analysis
1Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano A Certificate Status Checking Protocol for the Authenticated Dictionary. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yuri Melnikov, Alexander O. Tarakanov Immunocomputing Model of Intrusion Detection. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF formal immune networks, immunochip, immunocomputing
1Alexander Rostovtsev, Elena Makhovenko Elliptic Curve Point Multiplication. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Victor A. Skormin, Douglas H. Summerville, James Moronski Detecting Malicious Codes by the Presence of Their "Gene of Self-replication". Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Vladimir Gorodetsky, Leonard J. Popyack, Victor A. Skormin (eds.) Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Sri Kumar, Vladimir Marbukh A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin Logical Resolving for Security Evaluation. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF safety problem resolving, secure state, access control, language, logic, resolution, security model, security evaluation
1Kaiwen Zhang 0002, Shuozhong Wang, Xinpeng Zhang 0001 Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Igor V. Kotenko, Evgeny Man'kov Experiments with Simulation of Attacks against Computer Networks. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu, Jaehong Park Usage Control: A Vision for Next Generation Access Control. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis A Knowledge-Based Repository Model for Security Policies Management. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Kulesh Shanmugasundaram, Nasir D. Memon, Anubhav Savant, Hervé Brönnimann ForNet: A Distributed Forensics Network. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Shuozhong Wang, Xinpeng Zhang 0001, Kaiwen Zhang 0002 Data Hiding in Digital Audio by Frequency Domain Dithering. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Michael Smirnov Rule-Based Systems Security Model. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee 0002, Jongin Lim 0001 Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Controlled Permutation, Higher order differential, Linear equation, Algebraic degree, SPECTR-H64
1Kyubum Wee, Byungeun Moon Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Thumrongsak Kosiyatrakul, Susan Older, Polar Humenn, Shiu-Kai Chin Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Shambhu J. Upadhyaya Real-Time Intrusion Detection with Emphasis on Insider Attacks. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Dae Hyun Yum, Jae Eun Kang, Pil Joong Lee Advanced Certificate Status Protocol. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF ACSP, PKI, certificate revocation, CRL, OCSP
1Lazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis GRID Security Review. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Xinpeng Zhang 0001, Shuozhong Wang, Kaiwen Zhang 0002 Steganography with Least Histogram Abnormality. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Anatol Slissenko Complexity Problems in the Analysis of Information Systems Security. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli Symbolic Partial Model Checking for Security Analysis. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Pino Caballero-Gil, Candelaria Hernández-Goya A Zero-Knowledge Identification Scheme. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Average-case completeness, Identification, Zero-knowledge
1Nick A. Moldovyan On Cipher Design Based on Switchable Controlled Operations. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Fast Encryption, Hardware-Oriented Ciphers, Switchable Operations, Controlled Operations, Data-Dependent Operations
1Gustavo Santana, Leonid Sheremetov, Miguel Contreras Agent Platform Security Architecture. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Antonio Lain, Viacheslav Borisov Key History Tree: Efficient Group Key Management with Off-Line Members. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang 0009, Olivier Nimeskern, Chia-Wei Hu A Behavior-Based Approach to Securing Email Systems. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Dmitry P. Zegzhda, Pavel G. Stepanov, Alexey D. Otavin Fenix Secure Operating System: Principles, Models and Architecture. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Jan Jürjens Composability of Secrecy. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF formal specification, Network security, refinement, modularity, cryptographic protocols, computer aided software engineering, composability, secrecy
1Andrey Kostogryzov Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ). Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ghassan Chaddoud, Isabelle Chrisment, André Schaff Dynamic Group Key Management Protocol. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Victor A. Skormin, José G. Delgado-Frias, Dennis L. McGee, Joseph Giordano, Leonard J. Popyack, Vladimir I. Gorodetski, Alexander O. Tarakanov BASIS: A Biological Approach to System Information Security. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Vladimir I. Gorodetski, Oleg Karsaev, Alexey Khabalov, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin Agent-Based Model of Computer Network Security System: A Case Study. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Michael Smirnov Security Considerations and Models for Service Creation in Premium IP Networks. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Vladimir I. Gorodetski, Leonard J. Popyack, Vladimir Samoilov, Victor A. Skormin SVD-Based Approach to Transparent Embedding Data into Digital Images. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Catherine Meadows 0001 Open Issues in Formal Methods for Cryptographic Protocol Analysis. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Peter D. Zegzhda, Dmitry P. Zegzhda Secure Systems Design Technology. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Boris V. Izotov, Alexander A. Moldovyan, Nick A. Moldovyan Controlled Operations as a Cryptographic Primitive. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Iliano Cervesato Typed MSR: Syntax and Examples. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Antonio Durante, Riccardo Focardi, Roberto Gorrieri CVS at Work: A Report on New Failures upon Some Cryptographic Protocols. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Steve Barker TRBAC: A Temporal Authorization Model. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Vijay Varadharajan Secure Networked Computing. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Tatyana Ryutov, B. Clifford Neuman The Set and Function Approach to Modeling Authorization in Distributed Systems. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Selçuk Kavut, Melek D. Yücel On Some Cryptographic Properties of Rijndael. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Alexander O. Tarakanov Information Security with Formal Immune Networks. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Alexandr Seleznyov, Oleksiy Mazhelis, Seppo Puuronen Learning Temporal Regularities of User Behavior for Anomaly Detection. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF User Recognition, Intrusion Detection, Network Security, Anomaly Detection, User Profiling, Online Learning
1Alexander A. Grusho Mathematical Models of the Covert Channels. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Nick D. Goots, Alexander A. Moldovyan, Nick A. Moldovyan Fast Encryption Algorithm Spectr-H64. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Konstantin Knorr, Harald Weidner Analyzing Separation of Duties in Petri Net Workflows. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Petri net, workflow, Logical programming, separation of duties
1Dimitris Gritzalis, Konstantinos Moulinos, Konstantinos Kostis A Privacy-Enhancing e-Business Model Based on Infomediaries. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Harjit Singh, Steven Furnell, Benn Lines, Paul Dowland 0001 Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Behavioural Profiling, Data Mining, Knowledge Discovery, Intrusion Detection Systems, Intelligent Data Analysis
1Valeri Korjik, Kirill Morozov Generalized Oblivious Transfer Protocols Based on Noisy Channels. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 204 (100 per page; Change: )
Pages: [<<][1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license