Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | Vivek Nigam, Carolyn L. Talcott, Abraão Aires Urquiza |
Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
22 | Junhai Luo, Shi-hua Zou |
Strong k-Barrier Coverage for One-Way Intruders Detection in Wireless Sensor Networks. |
Int. J. Distributed Sens. Networks |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Yunsick Sung |
Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators. |
Entropy |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Eirini-Eleni Tsiropoulou, John S. Baras, Symeon Papavassiliou, Gang Qu 0001 |
On the Mitigation of Interference Imposed by Intruders in Passive RFID Networks. |
GameSec |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Dahee Jeong, Minkyoung Cho, Omprakash Gnawali, HyungJune Lee |
Proactive patrol dispatch surveillance system by inferring mobile trajectories of multiple intruders using binary proximity sensors. |
INFOCOM |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Hichem Sedjelmaci, Sidi Mohammed Senouci |
Smart grid Security: A new approach to detect intruders in a smart grid Neighborhood Area Network. |
WINCOM |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Vivek Nigam, Carolyn L. Talcott, Abraão Aires Urquiza |
Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders. |
ESORICS (2) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Shou-Hsuan Stephen Huang, Hongyang Zhang, Michael Phay |
Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections. |
AINA |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Michael B. Jamoom, Mathieu Joerger, Boris Pervan |
UAS sense and avoid integrity and continuity for multiple intruders. |
PLANS |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Mohamed Abomhara, Geir M. Køien |
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. |
J. Cyber Secur. Mobil. |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Omar Said, Alaa Elnashar |
Scaling of wireless sensor network intrusion detection probability: 3D sensors, 3D intruders, and 3D environments. |
EURASIP J. Wirel. Commun. Netw. |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Josep Domingo-Ferrer, Krishnamurty Muralidhar |
New Directions in Anonymization: Permutation Paradigm, Verifiability by Subjects and Intruders, Transparency to Users. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
22 | David Brumley |
Invisible Intruders: Rootkits in Practice. |
login Usenix Mag. |
2015 |
DBLP BibTeX RDF |
|
22 | Ana Filipa Sequeira, Jaime S. Cardoso 0001 |
Fingerprint Liveness Detection in the Presence of Capable Intruders. |
Sensors |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Qixiang Yu, Zhenxing Luo, Paul S. Min |
Intrusion detection in wireless sensor networks for destructive intruders. |
APSIPA |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Ling Xue, Wei Lu 0018 |
Profiling Behavior of Intruders on Enterprise Honeynet: Deployment and Analysis. |
CONF-IRM |
2015 |
DBLP BibTeX RDF |
|
22 | Satoshi Hoshino, Takahito Ishiwata |
Probabilistic surveillance by mobile robot for unknown intruders. |
IROS |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Satoshi Hoshino, Shingo Ugajin, Takahito Ishiwata |
Patrolling robot based on Bayesian learning for multiple intruders. |
IROS |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Lacrimioara Grama, Corneliu Rusu, Gabriel Oltean, Laura Ivanciu |
Quantization effects on audio signals for detecting intruders in wild areas using TESPAR S-matrix and artificial neural networks. |
SpeD |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald, Samuel H. Russ |
A System to Recognize Intruders in Controller Area Network (CAN). |
ICS-CSR |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Jie Tian 0002, Guiling Wang 0001, Tan Yan, Wensheng Zhang 0001 |
Detect smart intruders in sensor networks by creating network dynamics. |
Comput. Networks |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Blase Ur, Jaeyeon Jung, Stuart E. Schechter |
Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance. |
UbiComp |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Paulo Shakarian, Damon Paulo, Massimiliano Albanese, Sushil Jajodia |
Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. |
SECRYPT |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Hichem Sedjelmaci, Tarek Bouali, Sidi Mohammed Senouci |
Detection and prevention from misbehaving intruders in vehicular networks. |
GLOBECOM |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Paulo Shakarian, Nimish Kulkarni, Massimiliano Albanese, Sushil Jajodia |
Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. |
ICETE (Selected Papers) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Al-Sakib Khan Pathan, Wafaa Mustafa Abduallah, Shapla Khanam, Habibullah Yusuf Saleem |
A Pay-and-Stay model for tackling intruders in hybrid wireless mesh networks. |
Simul. |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Carlos Ribeiro, Ivo Anastácio, André Costa, Márcia Baptista |
A Framework for Robust Address Assignment in WSNs Whispering to Avoid Intruders. |
Int. J. Distributed Sens. Networks |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson |
Lazy Mobile Intruders. |
POST |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Ari Gesher |
Adaptive adversaries: building systems to fight fraud and cyber intruders. |
KDD |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Joshua Ojo Nehinbe, Nehibe Johnson Ige |
Methods for Using Intrusion Logs to Establish Criminal Evidence Against Intruders. |
EUSPN/ICTH |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Marius Vasile Ghiurcau, Corneliu Rusu, Radu Ciprian Bilcu, Jaakko Astola |
Audio based solutions for detecting intruders in wild areas. |
Signal Process. |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Xiannuan Liang, Yang Xiao 0001 |
Studying the stochastic capturing of moving intruders by mobile sensors. |
Comput. Math. Appl. |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul, Congduc Pham |
Low-Cost Monitoring and Intruders Detection Using Wireless Video Sensor Networks. |
Int. J. Distributed Sens. Networks |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Jesús Conesa-Muñoz, Angela Ribeiro |
Consolidation of a WSN and Minimax Method to Rapidly Neutralise Intruders in Strategic Installations. |
Sensors |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Dietmar Stiller, Stephan Benen, Paula Berkel |
An Experiment for Detection of Underwater Intruders with Different Kinds of Sensors. |
Future Security |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Lu-An Tang, Quanquan Gu, Xiao Yu 0007, Jiawei Han 0001, Thomas La Porta, Alice Leung, Tarek F. Abdelzaher, Lance M. Kaplan |
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems. |
SDM |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Nur Al Hasan Haldar, Muhammad Abulaish, Syed Asim Pasha |
A Statistical Pattern Mining Approach for Identifying Wireless Network Intruders. |
ACITY (1) |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Emad Aboelela, Altaf H. Khan |
Wireless sensors and neural networks for intruders detection and classification. |
ICOIN |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Jeff Flynn |
Network Security: Trapping Intruders. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Rachid Beghdad, Mohamed Touati, Mohamed Seghir Berboucha |
A Data Analysis-Based Approach for Detecting Intruders. |
Inf. Secur. J. A Glob. Perspect. |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Bo Jiang 0004, Xuehou Tan |
Searching for mobile intruders in circular corridors by two 1-searchers. |
Discret. Appl. Math. |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Rita Cucchiara, Michele Fornaciari, Razia Haider, Federica Mandreoli, Riccardo Martoglia, Andrea Prati 0001, Simona Sassatelli |
A reasoning engine for intruders' localization in wide open areas using a network of cameras and RFIDs. |
CVPR Workshops |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Wei Ding 0003, Shou-Hsuan Stephen Huang |
Detecting Intruders Using a Long Connection Chain to Connect to a Host. |
AINA |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Rita Cucchiara, Michele Fornaciari, Razia Haider, Federica Mandreoli, Andrea Prati 0001 |
Identification of intruders in groups of people using cameras and RFIDs. |
ICDSC |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Pranav Krishnamoorthy, Matthew K. Wright |
Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network. |
AISec |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Damas P. Gruska |
Diagnosability of Nested Intruders. |
BIONETICS |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S. H. Huang |
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
time-jittering, chaff-perturbation, intrusion detection, Network security, manipulation, stepping-stone, evasion |
22 | Marius Vasile Ghiurcau, Corneliu Rusu, Jaakko Astola, Radu Ciprian Bilcu |
Towards an application for detecting intruders in wildlife regions. |
EUSIPCO |
2010 |
DBLP BibTeX RDF |
|
22 | Wei Ding 0003, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, Zach Riggle |
Detecting Stepping-Stone Intruders with Long Connection Chains. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Nina Oertel |
Tracking based product authentication: Catching intruders in the supply chain. |
ECIS |
2009 |
DBLP BibTeX RDF |
|
22 | Min-You Wu |
Anti-Sensornet: Intruders and Countermeasures. |
MASS |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Lélia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial |
Distributed chasing of network intruders. |
Theor. Comput. Sci. |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Osvaldo Faggioni, Maurizio Soldani, Amleto Gabellone, Paolo Maggiani, Davide Leoncini |
Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance. |
CISIS |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Carlos Nuno da Cruz Ribeiro |
Robust sensor self-initialization: Whispering to avoid intruders. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Andreas Kolling, Stefano Carpin |
Detecting Intruders in Complex Environments with Limited Range Mobile Sensors. |
RoMoCo |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Tim J. Grant 0001, H. S. Venter, Jan H. P. Eloff |
Simulating adversarial interactions between intruders and system administrators using OODA-RR. |
SAICSIT |
2007 |
DBLP DOI BibTeX RDF |
OODA, process model, adversary |
22 | Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch |
Intruders with Caps. |
RTA |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya |
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario. |
GLOBECOM |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Lélia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial |
Distributed Chasing of Network Intruders. |
SIROCCO |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Akara Prayote, Paul Compton |
Detecting Anomalies and Intruders. |
Australian Conference on Artificial Intelligence |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Frank Adelstein, Prasanth Alla, Robert A. Joyce, Golden G. Richard III |
Physically Locating Wireless Intruders. |
J. Univers. Comput. Sci. |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Richard A. Henders, Bill Opdyke |
Detecting intruders on a campus network: might the threat be coming from within? |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
intrusion detection, snort |
22 | Frank Adelstein, Prasanth Alla, Robert A. Joyce, Golden G. Richard III |
Physically Locating Wireless Intruders. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Linda Dailey Paulson |
Stopping Intruders Outside the Gates. |
Computer |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Masafumi Yamashita, Hideki Umemoto, Ichiro Suzuki, Tsunehiko Kameda |
Searching for Mobile Intruders in a Polygonal Region by a Group of Mobile Searchers. |
Algorithmica |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Glenn Mansfield, Kohei Ohta, Yohsuke Takei, Nei Kato, Yoshiaki Nemoto |
Towards trapping wily intruders in the large. |
Comput. Networks |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Vern Paxson |
Bro: a system for detecting network intruders in real-time. |
Comput. Networks |
1999 |
DBLP DOI BibTeX RDF |
|
22 | Glenn Mansfield |
Towards trapping wily intruders in the large. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
22 | Vern Paxson |
Bro: A System for Detecting Network Intruders in Real-Time. |
USENIX Security Symposium |
1998 |
DBLP BibTeX RDF |
|
22 | Masafumi Yamashita, Hideki Umemoto, Ichiro Suzuki, Tsunehiko Kameda |
Searching for Mobile Intruders in a Polygonal Region by a Group of Mobile Searchers (Extended Abstract). |
SCG |
1997 |
DBLP DOI BibTeX RDF |
|
22 | Stuart Staniford-Chen, Todd L. Heberlein |
Holding intruders accountable on the Internet. |
S&P |
1995 |
DBLP DOI BibTeX RDF |
|
22 | David Safford, Douglas Lee Schales, David K. Hess |
The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment. |
USENIX Security Symposium |
1993 |
DBLP BibTeX RDF |
|
22 | Gary Hardy |
Case study: Closing 'windows' against intruders. |
Comput. Secur. |
1992 |
DBLP BibTeX RDF |
|
22 | Paul L. Rosin |
Detecting and Classifying Intruders in Image Sequences. |
BMVC |
1991 |
DBLP DOI BibTeX RDF |
|
22 | Tanya Candia |
How VMS keeps out intruders. |
Comput. Secur. |
1990 |
DBLP DOI BibTeX RDF |
|
12 | Navid Imani, Hamid Sarbazi-Azad, Albert Y. Zomaya, Paria Moinzadeh |
Detecting Threats in Star Graphs. |
IEEE Trans. Parallel Distributed Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Ayda Saïdane, Vincent Nicomette, Yves Deswarte |
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers. |
IEEE Trans. Dependable Secur. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Shahriyar Mohammadi, Hediy Jahanshahi |
A secure E-tendering system. |
EIT |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Andreas Kolling, Stefano Carpin |
Probabilistic Graph-Clear. |
ICRA |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Francesco Amigoni, Nicola Basilico, Nicola Gatti 0001 |
Finding the optimal strategies for robotic patrolling with adversaries in topologically-represented environments. |
ICRA |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Ruoting Yang, Sharon Bewick, Mingjun Zhang, William R. Hamel, Tzyh Jong Tarn |
Adaptive immune system inspired perimeter patrol control strategy. |
IROS |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Adnan Nadeem, Michael P. Howarth |
Adaptive intrusion detection & prevention of denial of service attacks in MANETs. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection & prevention, ad-hoc network security |
12 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
Detecting Stepping-Stone Connection Using Association Rule Mining. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Mengqi Zeng, Dawu Gu, Fangyong Hou, Yuanyuan Zhang 0002, Tao Cheng |
Design and Implementation of Self-securing Disk. |
NAS |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Junmin Zhang, Yiwen Liang |
Integrating Innate and Adaptive Immunity for Worm Detection. |
WKDD |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Vasily Desnitsky, Igor V. Kotenko |
Design of Entrusting Protocols for Software Protection. |
IF&GIS |
2009 |
DBLP DOI BibTeX RDF |
Security protocol design, Remote entrusting, Protocol analysis and verification, Attacks, Software protection |
12 | Ghassan Ahmed Ali, Aman Jantan, Abdulghani Ali |
Honeybee-Based Model to Detect Intrusion. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
honeybee, intrusion detection, network security, natural computing |
12 | Patricia Mostardinha, Fernão Vístulo de Abreu |
Intrusion Detection in Circular Frustrated Systems: An Eminently Parallel Processing Algorithm. |
UC |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Michelle Graham, David Gray |
Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol. |
MobiSec |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Richard Holzer, Hermann de Meer |
Quantitative Modeling of Self-organizing Properties. |
IWSOS |
2009 |
DBLP DOI BibTeX RDF |
Self-Organziation, Target orientation, Adaptivity, Systems, Mathematical modeling, Resilience, Homogeneity |
12 | Pei-Te Chen, Chi-Sung Laih |
IDSIC: an intrusion detection system with identification capability. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Identification capability, System managers (SMs), Security auditors (SAs), Fingerprints, Intrusion detection systems (IDSs) |
12 | Régis Vincent, Dieter Fox, Jonathan Ko, Kurt Konolige, Benson Limketkai, Benoit Morisset, Charles Ortiz, Dirk Schulz 0001, Benjamin Stewart |
Distributed multirobot exploration, mapping, and task allocation. |
Ann. Math. Artif. Intell. |
2008 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classifications (2000) 90C35, 15A90, 90C30 |
12 | Kuo-Hwa Chiang, Kuang-Che Chang-Chien, Ruey-Feng Chang, Hsuan-Yen Yen |
Tamper Detection and Restoring System for Medical Images Using Wavelet-based Reversible Data Embedding. |
J. Digit. Imaging |
2008 |
DBLP DOI BibTeX RDF |
reversible data embedding, wavelet, restoring, Tamper detection |
12 | Renaud Feil, Louis Nyffenegger |
Evolution of cross site request forgery attacks. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Alia Fourati, Khaldoun Al Agha |
Detecting forged routing messages in ad hoc networks. |
Telecommun. Syst. |
2008 |
DBLP DOI BibTeX RDF |
OLSR protocol, Routing vulnerabilities, MANET, IDS, Security services |
12 | Ji Ma 0001, Mehmet A. Orgun |
Formalising theories of trust for authentication protocols. |
Inf. Syst. Frontiers |
2008 |
DBLP DOI BibTeX RDF |
Trust theory, Agents, Authentication protocols, Belief logic |
12 | Yuliy M. Baryshnikov, Edward G. Coffman Jr., Kyung Joon Kwak |
High Performance Sleep-Wake Sensor Systems Based on Cyclic Cellular Automata. |
IPSN |
2008 |
DBLP DOI BibTeX RDF |
intruder detection, cyclic cellular automata, self-organizing, Sleep schedule |
12 | Ralf Küsters, Tomasz Truderung |
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
security protocols, algebraic properties |
12 | Slim Rekhis, Jihène Krichène, Noureddine Boudriga |
DigForNet: Digital Forensic in Networking. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Aaron Hunter 0001 |
Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary. |
EuroISI |
2008 |
DBLP DOI BibTeX RDF |
|