The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for intruders with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-1998 (15) 1999-2000 (15) 2001-2002 (22) 2003-2004 (35) 2005 (35) 2006 (32) 2007 (41) 2008 (37) 2009 (20) 2010-2012 (18) 2013-2015 (21) 2016-2017 (19) 2018-2020 (19) 2021-2023 (20)
Publication types (Num. hits)
article(79) incollection(3) inproceedings(266) phdthesis(1)
Venues (Conferences, Journals, ...)
CoRR(9) ACSAC(6) IROS(6) Sensors(5) ESORICS(4) HICSS(4) IPSN(4) ISC(4) RAID(4) AINA(3) ATC(3) CCS(3) Comput. Networks(3) Comput. Secur.(3) CSFW(3) IAS(3) More (+10 of total 264)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 213 occurrences of 169 keywords

Results
Found 349 publication records. Showing 349 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
22Vivek Nigam, Carolyn L. Talcott, Abraão Aires Urquiza Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
22Junhai Luo, Shi-hua Zou Strong k-Barrier Coverage for One-Way Intruders Detection in Wireless Sensor Networks. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Yunsick Sung Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators. Search on Bibsonomy Entropy The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Eirini-Eleni Tsiropoulou, John S. Baras, Symeon Papavassiliou, Gang Qu 0001 On the Mitigation of Interference Imposed by Intruders in Passive RFID Networks. Search on Bibsonomy GameSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Dahee Jeong, Minkyoung Cho, Omprakash Gnawali, HyungJune Lee Proactive patrol dispatch surveillance system by inferring mobile trajectories of multiple intruders using binary proximity sensors. Search on Bibsonomy INFOCOM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Hichem Sedjelmaci, Sidi Mohammed Senouci Smart grid Security: A new approach to detect intruders in a smart grid Neighborhood Area Network. Search on Bibsonomy WINCOM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Vivek Nigam, Carolyn L. Talcott, Abraão Aires Urquiza Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders. Search on Bibsonomy ESORICS (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Shou-Hsuan Stephen Huang, Hongyang Zhang, Michael Phay Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections. Search on Bibsonomy AINA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Michael B. Jamoom, Mathieu Joerger, Boris Pervan UAS sense and avoid integrity and continuity for multiple intruders. Search on Bibsonomy PLANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Mohamed Abomhara, Geir M. Køien Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. Search on Bibsonomy J. Cyber Secur. Mobil. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Omar Said, Alaa Elnashar Scaling of wireless sensor network intrusion detection probability: 3D sensors, 3D intruders, and 3D environments. Search on Bibsonomy EURASIP J. Wirel. Commun. Netw. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Josep Domingo-Ferrer, Krishnamurty Muralidhar New Directions in Anonymization: Permutation Paradigm, Verifiability by Subjects and Intruders, Transparency to Users. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
22David Brumley Invisible Intruders: Rootkits in Practice. Search on Bibsonomy login Usenix Mag. The full citation details ... 2015 DBLP  BibTeX  RDF
22Ana Filipa Sequeira, Jaime S. Cardoso 0001 Fingerprint Liveness Detection in the Presence of Capable Intruders. Search on Bibsonomy Sensors The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Qixiang Yu, Zhenxing Luo, Paul S. Min Intrusion detection in wireless sensor networks for destructive intruders. Search on Bibsonomy APSIPA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Ling Xue, Wei Lu 0018 Profiling Behavior of Intruders on Enterprise Honeynet: Deployment and Analysis. Search on Bibsonomy CONF-IRM The full citation details ... 2015 DBLP  BibTeX  RDF
22Satoshi Hoshino, Takahito Ishiwata Probabilistic surveillance by mobile robot for unknown intruders. Search on Bibsonomy IROS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Satoshi Hoshino, Shingo Ugajin, Takahito Ishiwata Patrolling robot based on Bayesian learning for multiple intruders. Search on Bibsonomy IROS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Lacrimioara Grama, Corneliu Rusu, Gabriel Oltean, Laura Ivanciu Quantization effects on audio signals for detecting intruders in wild areas using TESPAR S-matrix and artificial neural networks. Search on Bibsonomy SpeD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald, Samuel H. Russ A System to Recognize Intruders in Controller Area Network (CAN). Search on Bibsonomy ICS-CSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Jie Tian 0002, Guiling Wang 0001, Tan Yan, Wensheng Zhang 0001 Detect smart intruders in sensor networks by creating network dynamics. Search on Bibsonomy Comput. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Blase Ur, Jaeyeon Jung, Stuart E. Schechter Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance. Search on Bibsonomy UbiComp The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Paulo Shakarian, Damon Paulo, Massimiliano Albanese, Sushil Jajodia Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Hichem Sedjelmaci, Tarek Bouali, Sidi Mohammed Senouci Detection and prevention from misbehaving intruders in vehicular networks. Search on Bibsonomy GLOBECOM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Paulo Shakarian, Nimish Kulkarni, Massimiliano Albanese, Sushil Jajodia Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. Search on Bibsonomy ICETE (Selected Papers) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Al-Sakib Khan Pathan, Wafaa Mustafa Abduallah, Shapla Khanam, Habibullah Yusuf Saleem A Pay-and-Stay model for tackling intruders in hybrid wireless mesh networks. Search on Bibsonomy Simul. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Carlos Ribeiro, Ivo Anastácio, André Costa, Márcia Baptista A Framework for Robust Address Assignment in WSNs Whispering to Avoid Intruders. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson Lazy Mobile Intruders. Search on Bibsonomy POST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Ari Gesher Adaptive adversaries: building systems to fight fraud and cyber intruders. Search on Bibsonomy KDD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Joshua Ojo Nehinbe, Nehibe Johnson Ige Methods for Using Intrusion Logs to Establish Criminal Evidence Against Intruders. Search on Bibsonomy EUSPN/ICTH The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Marius Vasile Ghiurcau, Corneliu Rusu, Radu Ciprian Bilcu, Jaakko Astola Audio based solutions for detecting intruders in wild areas. Search on Bibsonomy Signal Process. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Xiannuan Liang, Yang Xiao 0001 Studying the stochastic capturing of moving intruders by mobile sensors. Search on Bibsonomy Comput. Math. Appl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul, Congduc Pham Low-Cost Monitoring and Intruders Detection Using Wireless Video Sensor Networks. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Jesús Conesa-Muñoz, Angela Ribeiro Consolidation of a WSN and Minimax Method to Rapidly Neutralise Intruders in Strategic Installations. Search on Bibsonomy Sensors The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Dietmar Stiller, Stephan Benen, Paula Berkel An Experiment for Detection of Underwater Intruders with Different Kinds of Sensors. Search on Bibsonomy Future Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Lu-An Tang, Quanquan Gu, Xiao Yu 0007, Jiawei Han 0001, Thomas La Porta, Alice Leung, Tarek F. Abdelzaher, Lance M. Kaplan IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems. Search on Bibsonomy SDM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Nur Al Hasan Haldar, Muhammad Abulaish, Syed Asim Pasha A Statistical Pattern Mining Approach for Identifying Wireless Network Intruders. Search on Bibsonomy ACITY (1) The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Emad Aboelela, Altaf H. Khan Wireless sensors and neural networks for intruders detection and classification. Search on Bibsonomy ICOIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Jeff Flynn Network Security: Trapping Intruders. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Rachid Beghdad, Mohamed Touati, Mohamed Seghir Berboucha A Data Analysis-Based Approach for Detecting Intruders. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Bo Jiang 0004, Xuehou Tan Searching for mobile intruders in circular corridors by two 1-searchers. Search on Bibsonomy Discret. Appl. Math. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Rita Cucchiara, Michele Fornaciari, Razia Haider, Federica Mandreoli, Riccardo Martoglia, Andrea Prati 0001, Simona Sassatelli A reasoning engine for intruders' localization in wide open areas using a network of cameras and RFIDs. Search on Bibsonomy CVPR Workshops The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Wei Ding 0003, Shou-Hsuan Stephen Huang Detecting Intruders Using a Long Connection Chain to Connect to a Host. Search on Bibsonomy AINA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Rita Cucchiara, Michele Fornaciari, Razia Haider, Federica Mandreoli, Andrea Prati 0001 Identification of intruders in groups of people using cameras and RFIDs. Search on Bibsonomy ICDSC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Pranav Krishnamoorthy, Matthew K. Wright Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network. Search on Bibsonomy AISec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
22Damas P. Gruska Diagnosability of Nested Intruders. Search on Bibsonomy BIONETICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
22Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S. H. Huang Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF time-jittering, chaff-perturbation, intrusion detection, Network security, manipulation, stepping-stone, evasion
22Marius Vasile Ghiurcau, Corneliu Rusu, Jaakko Astola, Radu Ciprian Bilcu Towards an application for detecting intruders in wildlife regions. Search on Bibsonomy EUSIPCO The full citation details ... 2010 DBLP  BibTeX  RDF
22Wei Ding 0003, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, Zach Riggle Detecting Stepping-Stone Intruders with Long Connection Chains. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Nina Oertel Tracking based product authentication: Catching intruders in the supply chain. Search on Bibsonomy ECIS The full citation details ... 2009 DBLP  BibTeX  RDF
22Min-You Wu Anti-Sensornet: Intruders and Countermeasures. Search on Bibsonomy MASS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Lélia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed chasing of network intruders. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Osvaldo Faggioni, Maurizio Soldani, Amleto Gabellone, Paolo Maggiani, Davide Leoncini Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance. Search on Bibsonomy CISIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Carlos Nuno da Cruz Ribeiro Robust sensor self-initialization: Whispering to avoid intruders. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Andreas Kolling, Stefano Carpin Detecting Intruders in Complex Environments with Limited Range Mobile Sensors. Search on Bibsonomy RoMoCo The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Tim J. Grant 0001, H. S. Venter, Jan H. P. Eloff Simulating adversarial interactions between intruders and system administrators using OODA-RR. Search on Bibsonomy SAICSIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF OODA, process model, adversary
22Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch Intruders with Caps. Search on Bibsonomy RTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bhattacharya A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario. Search on Bibsonomy GLOBECOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Lélia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders. Search on Bibsonomy SIROCCO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Akara Prayote, Paul Compton Detecting Anomalies and Intruders. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Frank Adelstein, Prasanth Alla, Robert A. Joyce, Golden G. Richard III Physically Locating Wireless Intruders. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Richard A. Henders, Bill Opdyke Detecting intruders on a campus network: might the threat be coming from within? Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF intrusion detection, snort
22Frank Adelstein, Prasanth Alla, Robert A. Joyce, Golden G. Richard III Physically Locating Wireless Intruders. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Linda Dailey Paulson Stopping Intruders Outside the Gates. Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Masafumi Yamashita, Hideki Umemoto, Ichiro Suzuki, Tsunehiko Kameda Searching for Mobile Intruders in a Polygonal Region by a Group of Mobile Searchers. Search on Bibsonomy Algorithmica The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Glenn Mansfield, Kohei Ohta, Yohsuke Takei, Nei Kato, Yoshiaki Nemoto Towards trapping wily intruders in the large. Search on Bibsonomy Comput. Networks The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
22Vern Paxson Bro: a system for detecting network intruders in real-time. Search on Bibsonomy Comput. Networks The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
22Glenn Mansfield Towards trapping wily intruders in the large. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
22Vern Paxson Bro: A System for Detecting Network Intruders in Real-Time. Search on Bibsonomy USENIX Security Symposium The full citation details ... 1998 DBLP  BibTeX  RDF
22Masafumi Yamashita, Hideki Umemoto, Ichiro Suzuki, Tsunehiko Kameda Searching for Mobile Intruders in a Polygonal Region by a Group of Mobile Searchers (Extended Abstract). Search on Bibsonomy SCG The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
22Stuart Staniford-Chen, Todd L. Heberlein Holding intruders accountable on the Internet. Search on Bibsonomy S&P The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
22David Safford, Douglas Lee Schales, David K. Hess The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment. Search on Bibsonomy USENIX Security Symposium The full citation details ... 1993 DBLP  BibTeX  RDF
22Gary Hardy Case study: Closing 'windows' against intruders. Search on Bibsonomy Comput. Secur. The full citation details ... 1992 DBLP  BibTeX  RDF
22Paul L. Rosin Detecting and Classifying Intruders in Image Sequences. Search on Bibsonomy BMVC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
22Tanya Candia How VMS keeps out intruders. Search on Bibsonomy Comput. Secur. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
12Navid Imani, Hamid Sarbazi-Azad, Albert Y. Zomaya, Paria Moinzadeh Detecting Threats in Star Graphs. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Ayda Saïdane, Vincent Nicomette, Yves Deswarte The Design of a Generic Intrusion-Tolerant Architecture for Web Servers. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Shahriyar Mohammadi, Hediy Jahanshahi A secure E-tendering system. Search on Bibsonomy EIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Andreas Kolling, Stefano Carpin Probabilistic Graph-Clear. Search on Bibsonomy ICRA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Francesco Amigoni, Nicola Basilico, Nicola Gatti 0001 Finding the optimal strategies for robotic patrolling with adversaries in topologically-represented environments. Search on Bibsonomy ICRA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Ruoting Yang, Sharon Bewick, Mingjun Zhang, William R. Hamel, Tzyh Jong Tarn Adaptive immune system inspired perimeter patrol control strategy. Search on Bibsonomy IROS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Adnan Nadeem, Michael P. Howarth Adaptive intrusion detection & prevention of denial of service attacks in MANETs. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection & prevention, ad-hoc network security
12Ying-Wei Kuo, Shou-Hsuan Stephen Huang Detecting Stepping-Stone Connection Using Association Rule Mining. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Mengqi Zeng, Dawu Gu, Fangyong Hou, Yuanyuan Zhang 0002, Tao Cheng Design and Implementation of Self-securing Disk. Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Junmin Zhang, Yiwen Liang Integrating Innate and Adaptive Immunity for Worm Detection. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Vasily Desnitsky, Igor V. Kotenko Design of Entrusting Protocols for Software Protection. Search on Bibsonomy IF&GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security protocol design, Remote entrusting, Protocol analysis and verification, Attacks, Software protection
12Ghassan Ahmed Ali, Aman Jantan, Abdulghani Ali Honeybee-Based Model to Detect Intrusion. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF honeybee, intrusion detection, network security, natural computing
12Patricia Mostardinha, Fernão Vístulo de Abreu Intrusion Detection in Circular Frustrated Systems: An Eminently Parallel Processing Algorithm. Search on Bibsonomy UC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Michelle Graham, David Gray Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Richard Holzer, Hermann de Meer Quantitative Modeling of Self-organizing Properties. Search on Bibsonomy IWSOS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Self-Organziation, Target orientation, Adaptivity, Systems, Mathematical modeling, Resilience, Homogeneity
12Pei-Te Chen, Chi-Sung Laih IDSIC: an intrusion detection system with identification capability. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Identification capability, System managers (SMs), Security auditors (SAs), Fingerprints, Intrusion detection systems (IDSs)
12Régis Vincent, Dieter Fox, Jonathan Ko, Kurt Konolige, Benson Limketkai, Benoit Morisset, Charles Ortiz, Dirk Schulz 0001, Benjamin Stewart Distributed multirobot exploration, mapping, and task allocation. Search on Bibsonomy Ann. Math. Artif. Intell. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Mathematics Subject Classifications (2000) 90C35, 15A90, 90C30
12Kuo-Hwa Chiang, Kuang-Che Chang-Chien, Ruey-Feng Chang, Hsuan-Yen Yen Tamper Detection and Restoring System for Medical Images Using Wavelet-based Reversible Data Embedding. Search on Bibsonomy J. Digit. Imaging The full citation details ... 2008 DBLP  DOI  BibTeX  RDF reversible data embedding, wavelet, restoring, Tamper detection
12Renaud Feil, Louis Nyffenegger Evolution of cross site request forgery attacks. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Alia Fourati, Khaldoun Al Agha Detecting forged routing messages in ad hoc networks. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF OLSR protocol, Routing vulnerabilities, MANET, IDS, Security services
12Ji Ma 0001, Mehmet A. Orgun Formalising theories of trust for authentication protocols. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trust theory, Agents, Authentication protocols, Belief logic
12Yuliy M. Baryshnikov, Edward G. Coffman Jr., Kyung Joon Kwak High Performance Sleep-Wake Sensor Systems Based on Cyclic Cellular Automata. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intruder detection, cyclic cellular automata, self-organizing, Sleep schedule
12Ralf Küsters, Tomasz Truderung Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security protocols, algebraic properties
12Slim Rekhis, Jihène Krichène, Noureddine Boudriga DigForNet: Digital Forensic in Networking. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Aaron Hunter 0001 Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary. Search on Bibsonomy EuroISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 349 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license