The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for intrusion with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1991 (15) 1992-1994 (22) 1995-1996 (19) 1997 (21) 1998 (21) 1999 (101) 2000 (82) 2001 (116) 2002 (179) 2003 (304) 2004 (453) 2005 (612) 2006 (626) 2007 (603) 2008 (674) 2009 (552) 2010 (420) 2011 (377) 2012 (338) 2013 (307) 2014 (319) 2015 (323) 2016 (370) 2017 (441) 2018 (595) 2019 (702) 2020 (790) 2021 (953) 2022 (1105) 2023 (1303) 2024 (309)
Publication types (Num. hits)
article(5186) book(16) data(15) incollection(79) inproceedings(7542) phdthesis(194) proceedings(20)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3828 occurrences of 1280 keywords

Results
Found 13052 publication records. Showing 13052 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
41Zhengdao Zhang, Zhumiao Peng, Zhiping Zhou The Study of Intrusion Prediction Based on HsMM. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41F. Abdoli, Mohsen Kahani Using Attacks Ontology in Distributed Intrusion Detection System. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction. Search on Bibsonomy FSKD (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Alex Hai Wang, Peng Liu 0005 Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Xin Xu, Tao Xie 0005 A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls. Search on Bibsonomy ICIC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Fang-Yie Leu, Wei-Jie Yang, Wen-Kui Chang IFTS: Intrusion Forecast and Traceback based on Union Defense Environment. Search on Bibsonomy ICPADS (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Mohammad Banikazemi, Dan E. Poff, Bülent Abali Storage-Based Intrusion Detection for Storage Area Networks (SANs). Search on Bibsonomy MSST The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Eivind Naess, Deborah A. Frincke, A. David McKinnon, David E. Bakken Configurable Middleware-Level Intrusion Detection for Embedded Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Alexey Smirnov 0001, Tzi-cker Chiueh A Portable Implementation Framework for Intrusion-Resilient Database Management Systems. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Sankalp Singh, Michel Cukier, William H. Sanders Probabilistic Validation of an Intrusion-Tolerant Replication System. Search on Bibsonomy DSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Jianhua Sun 0002, Hai Jin 0001, Hao Chen 0002, Zongfen Han, Deqing Zou A Data Mining Based Intrusion Detection Model. Search on Bibsonomy IDEAL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Dit-Yan Yeung, Calvin Chow Parzen-Window Network Intrusion Detectors. Search on Bibsonomy ICPR (4) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Hai Jin 0001, Jianhua Sun 0002, Hao Chen 0002, Zongfen Han A Risk-Sensitive Intrusion Detection Model. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41John E. Gaffney Jr., Jacob W. Ulvila Evaluation of Intrusion Detectors: A Decision Theory Approach. Search on Bibsonomy S&P The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41R. Sekar 0001, Y. Guang, S. Verma, T. Shanbhag A High-Performance Network Intrusion Detection System. Search on Bibsonomy CCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
39Yu-Sung Wu, Vinita Apte, Saurabh Bagchi, Sachin Garg, Navjot Singh 0001 Intrusion detection in voice over IP environments. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Voice over IP system, Cross-protocol detection, Stateful detection, Correlation-based IDS, Intrusion detection, SIP, RTP
39Jaafar Almasizadeh, Mohammad Abdollahi Azgomi A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion process, semi-Markov chain (SMC), Security, modeling, evaluation, attacker, system, discrete-time Markov chain (DTMC)
39Kamran Shafi, Tim Kovacs, Hussein A. Abbass, Weiping Zhu 0001 Intrusion detection with evolutionary learning classifier systems. Search on Bibsonomy Nat. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Learning classifier systems, XCS, LCS, Intrusion, UCS
39Ching-Hao Mao, Hahn-Ming Lee, Devi Parikh, Tsuhan Chen, Si-Yu Huang Semi-supervised co-training and active learning based approach for multi-view intrusion detection. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection, active learning, semi-supervised learning, co-training, multi-view
39Fabian Hugelshofer, Paul Smith 0001, David Hutchison 0001, Nicholas J. P. Race OpenLIDS: a lightweight intrusion detection system for wireless mesh networks. Search on Bibsonomy MobiCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF performance, intrusion detection, wireless mesh network, resource constrained devices
39Ioannis Krontiris, Zinaida Benenson, Thanassis Giannetsos, Felix C. Freiling, Tassos Dimitriou Cooperative Intrusion Detection in Wireless Sensor Networks. Search on Bibsonomy EWSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, sensor networks, intrusion detection
39Yermek Nugmanov, Brajendra Panda, Yi Hu Analysis of Data Dependency Based Intrusion Detection System. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Database intrusion detection, semantic analyzer, response strategy, cost analysis
39Rung Ching Chen, Chia-Fen Hsieh, Yung-Fa Huang A new method for intrusion detection on hierarchical wireless sensor networks. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack behaviors, wireless sensor networks, intrusion detection, anomaly detection, countermeasures
39Ning-Qing Sun, Yang Li 0002 Intrusion Detection Based on Back-Propagation Neural Network and Feature Selection Mechanism. Search on Bibsonomy FGIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF neural network, feature selection, Intrusion detection, independent component analysis
39Zhenwei Yu 0001, Jeffrey J. P. Tsai, Thomas J. Weigert An adaptive automatically tuning intrusion detection system. Search on Bibsonomy ACM Trans. Auton. Adapt. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, Fuzzy control
39Liwei Kuang, Mohammad Zulkernine An anomaly intrusion detection method using the CSI-KNN algorithm. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CSI-KNN algorithm, machine learning, intrusion detection
39L. Prema Rajeswari, Arputharaj Kannan, Ramachandran Baskaran An Escalated Approach to Ant Colony Clustering Algorithm for Intrusion Detection System. Search on Bibsonomy ICDCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multiple-level decision tree, Ant colony Clustering, Data Mining, Intrusion Detection
39Ioanna Kantzavelou, Sokratis K. Katsikas A Generic Intrusion Detection Game Model in IT Security. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF internal attacker, Intrusion Detection, noncooperative Game Theory
39Sartid Vongpradhip, Wichet Plaimart Survival Architecture for Distributed Intrusion Detection System (dIDS) using Mobile Agent. Search on Bibsonomy NCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mobile agent, Network security, Distributed denial-of-service, Security architecture, security engineering, Distributed intrusion detection systems
39William R. Mahoney, William L. Sousan Instrumentation of Open-Source Software for Intrusion Detection. Search on Bibsonomy RV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion Detection, Domain Specific Language, Instrumentation
39Tran Hoang Hai, Faraz Idris Khan, Eui-nam Huh Hybrid Intrusion Detection System for Wireless Sensor Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF routing attacks, security, wireless sensor networks, Intrusion detection
39Sang Hyun Oh, Won Suk Lee Anomaly Intrusion Detection Based on Dynamic Cluster Updating. Search on Bibsonomy PAKDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data Mining, Clustering, Intrusion Detection, Anomaly Detection
39Gang Kou, Yi Peng 0001, Yong Shi 0001, Zhengxin Chen Network Intrusion Detection by Multi-group Mathematical Programming based Classifier. Search on Bibsonomy ICDM Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multiple criteria mathematical programming, Multi-group classification, Security, Network intrusion detection
39Markus Miettinen, Perttu Halonen Host-Based Intrusion Detection for Advanced Mobile Devices. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mobile devices, security monitoring, host-based intrusion detection
39Thomas M. Chen, Varadharajan Venkataramanan Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF intrusion detecction, security, ad hoc networks, peer to peer
39Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ad hoc network, Intrusion Detection, Network Security, Formal reasoning
39Taghi M. Khoshgoftaar, Mohamed E. Abushadi Resource-Sensitive Intrusion Detection Models for Network Traffic. Search on Bibsonomy HASE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cost-sensitive resource-based intrusion detection, modified expected cost of misclassification, network security, decision trees
39Frédéric Cuppens, Sylvain Gombault, Thierry Sans Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IDMEF, counter-measures, anti-correlation, Intrusion detection, correlation, response
39Hyung-Jong Kim 0002 Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Atomic Vulnerability, DNS, Intrusion Tolerance, Vulnerability Analysis, DEVS formalism
39Yongsu Park, Jaeheung Lee, Yookun Cho Intrusion Detection Using Noisy Training Data. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, intrusion detection, anomaly detection, system call
39Hui Wang, Qing-Hua Li, Huanyu Xiong, Shengyi Jiang Mining Maximal Frequent Itemsets for Intrusion Detection. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF data mining, intrusion detection, maximal frequent itemset
39GangShin Lee, Chaetae Im, TaeJin Lee 0002, HyungJong Kim 0002, Dong Hoon Lee 0001 SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability. Search on Bibsonomy PCM (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SITIS, Middle-ware, Voting, Intrusion Tolerance, Group Management
39Klaus Julisch Clustering intrusion detection alarms to support root cause analysis. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF data mining, Intrusion detection, cluster analysis, false positives, root cause analysis
39Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou Integrated Access Control and Intrusion Detection for Web Servers. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Apache Web server, Access control, intrusion detection, authorization, security policy
39Peng Ning, Dingbang Xu Learning attack strategies from intrusion alerts. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF profiling attack strategies, intrusion detection, alert correlation
39Srinivas Mukkamala, Andrew H. Sung A Comparative Study of Techniques for Intrusion Detection. Search on Bibsonomy ICTAI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion detection, information security, AI techniques
39Mayukh Dass, James Cannady, Walter D. Potter A Blackboard-Based Learning Intrusion Detection System: A New Approach. Search on Bibsonomy IEA/AIE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion Detection, Network Security, Artificial Neural Network, Autonomous Agents, Blackboard Architecture
39Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer A Stateful Intrusion Detection System for World-Wide Web Servers. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Security, World-Wide Web, Intrusion Detection
39Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang Abstraction-based intrusion detection in distributed environments. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF intrusion detection, heterogeneous systems, Cooperative information systems, misuse detection
39Anita Jones, Song Li Temporal Signatures for Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF application intrusion detection, temporal signature, security
39Harjit Singh, Steven Furnell, Benn Lines, Paul Dowland 0001 Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Behavioural Profiling, Data Mining, Knowledge Discovery, Intrusion Detection Systems, Intelligent Data Analysis
39Wenke Lee, Salvatore J. Stolfo A framework for constructing features and models for intrusion detection systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF data mining, intrusion detection, feature construction
39Jean-Philippe Pouzol, Mireille Ducassé From Declarative Signatures to Misuse IDS. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
39Daniel F. Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid Autonomic Response to Distributed Denial of Service Attacks. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
39Frédéric Cuppens, Rodolphe Ortalo LAMBDA: A Language to Model a Database for Detection of Attacks. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
39Vinod Yegneswaran, Paul Barford, Johannes Ullrich Internet intrusions: global characteristics and prevalence. Search on Bibsonomy SIGMETRICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF internet performance and monitoring, wide area measurement, network security
37Moses Garuba, Chunmei Liu, Duane Fraites Intrusion Techniques: Comparative Study of Network Intrusion Detection Systems. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Wei Lu 0018, Hengjian Tong Detecting Network Anomalies Using CUSUM and EM Clustering. Search on Bibsonomy ISICA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, Intrusion detection
37Matthew Smith 0001, Christian Schridde, Bernd Freisleben Securing stateful grid servers through virtual server rotation. Search on Bibsonomy HPDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF self-cleansing servers, security, grid computing, virtualization, intrusion tolerance
37Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough DSO: Dependable Signing Overlay. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF P2P overlay, digital signing service, fault-tolerance, dependable, intrusion-tolerance
37John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi Preserving the Big Picture: Visual Network Traffic Analysis with TN. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information visualization, intrusion detection, network analysis, Network visualization
36Stephen S. Yau, Xinyu Zhang Computer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency Relation. Search on Bibsonomy COMPSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF intrusion assessment, security dependency relation, agent, intrusion detection, Network security, intrusion prevention, ripple effect analysis
36Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack classification, anomaly-based intrusion detection systems
36James J. Treinen, Ramakrishna Thurimella A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data Mining, Intrusion Detection, Association Rules, Graph Algorithms
36Sushant Sinha, Farnam Jahanian, Jignesh M. Patel WIND: Workload-Aware INtrusion Detection. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF workload aware, adaptive algorithm, deep packet inspection, Intrusion detection and prevention
36Debin Gao, Michael K. Reiter, Dawn Xiaodong Song Behavioral Distance for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF behavioral distance, Intrusion detection, system call
36Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang Performance Adaptation in Real-Time Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Real-time intrusion detection, performance adaptation, optimization, performance metrics
35Wei Wang 0084, Hong Man Exploring social relations for the intrusion detection in ad hoc networks. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Gilbert Hendry, Shanchieh Jay Yang Intrusion signature creation via clustering anomalies. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Jie Su, Yahui Liu Distributed intrusion detection system based on grid security model. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Peili Qiao, Tong Wang, Jie Su An immunity-based model for dynamic distributed intrusion detection. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Ciza Thomas, Vishwas Sharma, N. Balakrishnan 0001 Usefulness of DARPA dataset for intrusion detection system evaluation. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Ciza Thomas, N. Balakrishnan 0001 Selection of intrusion detection system threshold bounds for effective sensor fusion. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Jesús González-Pino, Janica Edmonds, Mauricio Papa Attribute selection using information gain for a fuzzy logic intrusion detection system. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Vladimir Nikulin Threshold-based clustering for intrusion detection systems. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Qiao Yan, Jianping Yu AINIDS: an immune-based network intrusion detection system. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Peili Qiao, Jie Su, Yahui Liu Distributed intrusion detection system based on fuzzy rules. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Ruichi Xin, Vijayaraghavan Venkatasubramanian, Henry Leung A novel interacting multiple model based network intrusion detection scheme. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Yongjun Hai, Yu Wu 0001, Guoyin Wang 0001 An improved unsupervised clustering-based intrusion detection method. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Qiang Wang 0010, Vasileios Megalooikonomou A clustering algorithm for intrusion detection. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Jingtao Yao 0001, Songlun Zhao, Lawrence V. Saxton A study on fuzzy intrusion detection. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Peili Qiao, Jie Su, Chengwei Sun Distributed intrusion detection system based on ARTIS. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Yao Li 0002, Zhitang Li, Hao Tu Dynamic immune intrusion detection system for IPv6. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Tansel Özyer, Reda Alhajj, Ken Barker 0001 Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Mian Zhou, Sheau-Dong Lang Weighted link graphs: a distributed IDS for secondary intrusion detection and defense. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Christoph C. Michael, Anup K. Ghosh Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF data mining, machine learning, finite automata, feature detection
35Wenke Lee, Christopher T. Park, Salvatore J. Stolfo Automated Intrusion Detection Using NFR: Methods and Experiences. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
35Anup K. Ghosh, Aaron Schwartzbard, Michael Schatz Learning Program Behavior Profiles for Intrusion Detection. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
35Sebastian G. Elbaum, John C. Munson Intrusion Detection Through Dynamic Software Measurement. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
35Riccardo Bettati, Wei Zhao 0001, D. Teodor Real-time Intrusion Detection and Suppression in ATM Networks. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
35Peter Mell, Mark McLarnon Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
35Dug Song, G. Shaffer, M. Undy Nidsbench - a Network Intrusion Detection Test Suite. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
35Richard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark R. Heckman, Dave Peticolas, Rick Crawford, Lee A. Benzinger, Sue Rho, Stephen Wu 0002 Intrusion Detection Inter-component Adaptive Negotiation. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
35Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Yuh Huang Intrusion Detection for an On-Going Attack. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
35Alexandr Seleznyov, Seppo Puuronen Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
35Richard Lippmann, Robert K. Cunningham Improving Intrusion Detection Performance using Keyword Selection and Neural Networks. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
35Christopher Ting, Tiang Hwee Ong, Yong Tai Tan, Pek Yong Ng Intrusion Detection, Internet Law Enforcement and Insurance Coverage to Accelerate the Proliferation of Internet Business Singapore. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
35Yves Cosendai, Marc Dacier, Paolo Scotton Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
Displaying result #101 - #200 of 13052 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license