The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Intruder with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1995 (16) 1996-1999 (15) 2000 (16) 2001-2002 (39) 2003 (35) 2004 (40) 2005 (47) 2006 (51) 2007 (59) 2008 (66) 2009 (43) 2010 (18) 2011-2012 (28) 2013-2014 (27) 2015 (15) 2016-2017 (29) 2018-2019 (18) 2020 (15) 2021 (18) 2022 (15) 2023 (16) 2024 (3)
Publication types (Num. hits)
article(160) book(1) incollection(1) inproceedings(464) phdthesis(3)
Venues (Conferences, Journals, ...)
CoRR(29) ACC(7) CSFW(7) ESORICS(7) RTA(7) CDC(6) EUROCRYPT(6) ARES(5) Formal Aspects in Security and...(5) ICC(5) SMC(5) ACSAC(4) ICCSA (1)(4) ICRA(4) Int. J. Inf. Sec.(4) IROS(4) More (+10 of total 415)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 387 occurrences of 262 keywords

Results
Found 629 publication records. Showing 629 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Muhammad Usman Arif, Ali Marzoughi Arithmetic mean-based decision-making algorithm for obstacle avoidance and multiple intruder detection. Search on Bibsonomy ANZCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Doron Nussbaum, Fedor Ilitchev Catching a Robot Intruder with Limited Information. Search on Bibsonomy IRC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Péter Bauer, Antal Hiba, Jozsef Bokor, Ákos Zarándy Three Dimensional Intruder Closest Point of Approach Estimation Based-on Monocular Image Parameters in Aircraft Sense and Avoid - Motto: 'Almost Everything from Almost Nothing'. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Mo Chen, Somil Bansal, Jaime F. Fisac, Claire J. Tomlin Robust Sequential Trajectory Planning Under Disturbances and Adversarial Intruder. Search on Bibsonomy IEEE Trans. Control. Syst. Technol. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19T. Kavitha, K. Geetha, Rajappa Muthaiah India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc Networks Using Feature Optimization and Classification Approach. Search on Bibsonomy J. Medical Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19T. Kavitha, K. Geetha, Rajappa Muthaiah Correction to: India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc Networks Using Feature Optimization and Classification Approach. Search on Bibsonomy J. Medical Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19K. Narasimha Mallikarjunan, S. Mercy Shalinie, A. Bhuvaneshwaran BAIT: behaviour aided intruder testimony technique for attacker intention prediction in business data handling. Search on Bibsonomy Int. J. Bus. Intell. Data Min. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Farah M. Alsalami, Zahir Ahmad, Stanislav Zvanovec, Paul Anthony Haigh, Olivier C. L. Haas, Sujan Rajbhandari Indoor Intruder Tracking Using Visible Light Communications. Search on Bibsonomy Sensors The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Gul Rukh Khan, Carlo Novara, Khalid Haseeb, Atif Ishtiaq A novel algorithm for integrated control model using swarm robots for intruder detection and rescue schedules. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Erin Hanna, Christopher Lynch, David Jaz Myers, Corey Richardson Finding Intruder Knowledge with Cap-Matching. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Bokamoso Basutli, Adamu Murtala Zungeru, Bokani Mtengi, Bakary Diarra Design of a Short Range Optical Pulse Transceiver System for Intruder Detection. Search on Bibsonomy EEET The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Federico Corraro, G. Corraro, E. Filippone, L. Verde A Multi-Intruder Robust Collision Avoidance System for Integration of Unmanned Vehicles in Civil Transport. Search on Bibsonomy SMC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Wojciech Turek, Agata Kubiczek, Aleksander Byrski Evolutionary Optimization of Intruder Interception Plans for Mobile Robot Groups. Search on Bibsonomy ICCS (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Simone Nardi, Federico Mazzitelli, Lucia Pallottino A Game Theoretic Robotic Team Coordination Protocol For Intruder Herding. Search on Bibsonomy IEEE Robotics Autom. Lett. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Raghuram Bharadwaj Diddigi, Prabuchandran K. J., Shalabh Bhatnagar Novel Sensor Scheduling Scheme for Intruder Tracking in Energy Efficient Sensor Networks. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19S. I. Shterenberg, Maria A. Poltavtseva A Distributed Intrusion Detection System with Protection from an Internal Intruder. Search on Bibsonomy Autom. Control. Comput. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Ali Marzoughi Collision Free Navigation of a Multi-Robot Team for Intruder Interception. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
19Michael Morin, Margarita P. Castro, Kyle E. C. Booth, Tony T. Tran, Chang Liu 0029, J. Christopher Beck Intruder alert! Optimization models for solving the mobile robot graph-clear problem. Search on Bibsonomy Constraints An Int. J. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19M. Thirunavukkarasan, S. A. Sahaaya Arul Mary An Innovative Secure Approach to Detect Clone Node Intruder in Homogeneous Wireless Sensor Network. Search on Bibsonomy EAI Endorsed Trans. Mob. Commun. Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19William Bentz, Dimitra Panagou Energy-aware Persistent Coverage and Intruder Interception in 3D Dynamic Environments. Search on Bibsonomy ACC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Mauricio Ayala-Rincón, Maribel Fernández, Daniele Nantes-Sobrinho Intruder deduction problem for locally stable theories with normal forms and inverses. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Hua Chen 0007, Kalyanam Krishnamoorthy, Wei Zhang 0013, David W. Casbeer Intruder Isolation on a General Road Network Under Partial Information. Search on Bibsonomy IEEE Trans. Control. Syst. Technol. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Madhuri Rao, Narendra Kumar Kamila Tracking intruder ship in wireless environment. Search on Bibsonomy Hum. centric Comput. Inf. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Raghuram Bharadwaj Diddigi, Prabuchandran K. J., Shalabh Bhatnagar Novel Sensor Scheduling Scheme for Intruder Tracking in Energy Efficient Sensor Networks. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
19Murat Moran, James Heather Automated Analysis of Voting Systems under an Active Intruder Model in CSP. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
19Somil Bansal, Mo Chen, Claire J. Tomlin Safe and Resilient Multi-vehicle Trajectory Planning Under Adversarial Intruder. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
19Michael B. Jamoom, Adriano Canolla, Boris Pervan, Mathieu Joerger Unmanned Aircraft System Sense and Avoid Integrity: Intruder Linear Accelerations and Analysis. Search on Bibsonomy J. Aerosp. Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani Satisfiability of general intruder constraints with and without a set constructor. Search on Bibsonomy J. Symb. Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani Intruder deducibility constraints with negation. Decidability and application to secured service compositions. Search on Bibsonomy J. Symb. Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Aasma Shahid, Alina Tayyab, Musfira Mehmood, Rida Anum, Abdul Jalil, Ahmad Ali, Haider Ali 0005, Javed Ahmed Computer vision based intruder detection framework (CV-IDF). Search on Bibsonomy ICCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Jordan Daugherty, He Bai 0001, Sharath Avadhanam Orbiting intruder passive ranging for small UAS Detect-and-Avoid. Search on Bibsonomy CCTA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Safa Otoum, Burak Kantarci, Hussein T. Mouftah Mitigating False Negative intruder decisions in WSN-based Smart Grid monitoring. Search on Bibsonomy IWCMC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Dali Zhu, Na Pang, Weimiao Feng, Muhmmad Al-Khiza'ay, Yuchen Ma 0004 Device-Free Intruder Sensing Leveraging Fine-Grained Physical Layer Signatures. Search on Bibsonomy KSEM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Dhrubojyoti Roy, Christopher Morse, Michael A. McGrath, Jin He, Anish Arora Cross-Environmentally Robust Intruder Discrimination in Radar Motes. Search on Bibsonomy MASS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Ionut-Daniel Barbu, Cristian Pascariu, Ioan C. Bacivarov, Sabina-Daniela Axinte, Marian Firoiu Intruder monitoring system for local networks using Python. Search on Bibsonomy ECAI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Elena Roxana Buhus, Lacrimioara Grama, Corneliu Rusu Several classifiers for intruder detection applications. Search on Bibsonomy SpeD The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Christian Janze Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed. Search on Bibsonomy Bled eConference The full citation details ... 2017 DBLP  BibTeX  RDF
19Timothy Barron, Nick Nikiforakis Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Jiwan Seo, Seungjin Choi, Mucheol Kim, Sangyong Han A robust ensemble-based trust and reputation system against different types of intruder attacks. Search on Bibsonomy Int. J. Comput. Math. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Mo Chen, Somil Bansal, Jaime F. Fisac, Claire J. Tomlin Robust Sequential Path Planning Under Disturbances and Adversarial Intruder. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
19M. Swamidas, A. Govardhan 0001, D. Vijayalakshmi QoS Web Service Security Dynamic Intruder Detection System for HTTP SSL services. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
19Raviteja Upadrashta, Tarun Choubisa, A. Praneeth, Tony Gracious, V. S. Aswath, P. Vijay Kumar, Sripad S. Kowshik, Hari Prasad Gokul R, Tamma V. Prabhakar Animation and Chirplet-Based Development of a PIR Sensor Array for Intruder Classification in an Outdoor Environment. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
19Suvendu Kumar Mohapatra, Prasan Kumar Sahoo, Shih-Lin Wu Big data analytic architecture for intruder detection in heterogeneous wireless sensor networks. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Mosad Alkhathami, Lubna K. Alazzawi, Ali M. Elkateeb Smart Surveillant - an intruder alert system using CmuCam3. Search on Bibsonomy EIT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Asantha Thilina, Shakthi Attanayake, Sacith Samarakoon, Dahami Nawodya, Lakmal Rupasinghe, Nadith Pathirage, Tharindu Edirisinghe, Kesavan Krishnadeva Intruder Detection Using Deep Learning and Association Rule Mining. Search on Bibsonomy CIT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Sam Nazari, Bahram Shafai Distributed detection filter design for intruder identification. Search on Bibsonomy ACC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Md. Farhad Hossain, Musbiha Binte Wali, Kumudu S. Munasinghe, Abbas Jamalipour Three dimensional (3D) underwater sensor network architectures for intruder localization using EM wave. Search on Bibsonomy WCNC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Miguel Duarte, Jorge C. Gomes, Vasco Costa, Sancho Moura Oliveira, Anders Lyhne Christensen Hybrid Control for a Real Swarm Robotics System in an Intruder Detection Task. Search on Bibsonomy EvoApplications (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Leslie C. Milton, Atif Memon Intruder detector: A continuous authentication tool to model user behavior. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Bo Fu, Yang Xiao 0001, Xiannuan Liang, C. L. Philip Chen Bio-inspired Group Modeling and Analysis for Intruder Detection in Mobile Sensor/Robotic Networks. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Manish Kumar, Shubham Kaul Technical Report on Intruder Detection and Alert System. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
19Manish Kumar, Shubham Kaul, Vibhutesh Kumar Singh, Vivek Ashok Bohara iDART-Intruder Detection and Alert in Real Time. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
19Jiangliu Wang, Wei Li 0062 Motion patterns and phase-transition of a defender-intruder problem and optimal interception strategy of the defender. Search on Bibsonomy Commun. Nonlinear Sci. Numer. Simul. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Raviteja Upadrashta, Tarun Choubisa, V. S. Aswath, A. Praneeth, Ajit Prabhu, Siddhant Raman, Tony Gracious, P. Vijay Kumar, Sripad S. Kowshik, Madhuri Sheethala Iyer, Tamma V. Prabhakar An animation-and-chirplet based approach to intruder classification using PIR sensing. Search on Bibsonomy ISSNIP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Andrey Garnaev, Wade Trappe, Dragoslav Stojadinovic, Ivan Seskar Spectrum scanning when the intruder might have knowledge about the scanner's capabilities. Search on Bibsonomy ICASSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Norzaidi Baharudin, Fakariah Hani Mohd Ali, Mohamad Yusof Darus, Norkhushaini Awang Wireless Intruder Detection System (WIDS) in Detecting De-Authentication and Disassociation Attacks in IEEE 802.11. Search on Bibsonomy ICITCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Lacrimioara Grama, Corneliu Rusu About quantization of audio signals for wildlife intruder detection systems. Search on Bibsonomy ECCTD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty. Search on Bibsonomy GLOBECOM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Andreas Zweng, Csaba Beleznai, Christoph Sulzbachner Reliable intruder detection using combined modalities of intensity, thermal infrared and stereo depth. Search on Bibsonomy AVSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Muthuraman Thangaraj, Pichaiah Punitha Ponmalar Swarm Intelligence Based Data Aggregation for Intruder Detection in Wireless Sensor Networks. Search on Bibsonomy KMO The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Corneliu Rusu, Lacrimioara Grama Spectrograms, sparsograms and spectral signatures for wildlife intruder detection. Search on Bibsonomy SpeD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Evangelos Kranakis, Danny Krizanc, Flaminia L. Luccio, Brett Smith Maintaining Intruder Detection Capability in a Rectangular Domain with Sensors. Search on Bibsonomy ALGOSENSORS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Lacrimioara Grama, Corneliu Rusu The Quantization Effect on Audio Signals for Wildlife Intruder Detection Systems. Search on Bibsonomy EUROCAST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Eros Pasero, Eugenio Balzanelli, Federico Caffarelli Intruder recognition using ECG signal. Search on Bibsonomy IJCNN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Benito Camiña, Carlos Arturo Hernández-Gracidas, Raúl Monroy, Luis A. Trejo The Windows-Users and -Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Caroline Tudor, George Cornish, Keith Spicer Intruder Testing on the 2011 UK Census: Providing Practical Evidence for Disclosure Protection. Search on Bibsonomy J. Priv. Confidentiality The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Shibo He, Jiming Chen 0001, Xu Li 0001, Xuemin (Sherman) Shen, Youxian Sun Mobility and Intruder Prior Information Improving the Barrier Coverage of Sparse Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Jie Tian 0002, Wensheng Zhang 0001, Guiling Wang 0001, Xin Gao 2D k-barrier duty-cycle scheduling for intruder detection in Wireless Sensor Networks. Search on Bibsonomy Comput. Commun. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Nagaraj Ambika Recouping the Modified Data in Intruder-Based Environment. Search on Bibsonomy Int. J. Embed. Real Time Commun. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Pedro Adão, Paulo Mateus, Luca Viganò 0001 Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Fabio Pasqualetti, Filippo Zanella, Jeffrey Russel Peters, Markus Spindler, Ruggero Carli, Francesco Bullo Camera Network Coordination for Intruder Detection. Search on Bibsonomy IEEE Trans. Control. Syst. Technol. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19G. Sanjiv Rao, V. Valli Kumari Trail Coverage : A Coverage Model for Efficient Intruder Detection near Geographical Obstacles in WSNs. Search on Bibsonomy J. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Amitabha Bagchi, Rajshekar Kalayappan, Surabhi Sankhla Surveillance using non-stealthy sensors: A new intruder model. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Xueqin Zhang, Yifeng Zhang, Chunhua Gu GPU Implementation of Parallel Support Vector Machine Algorithm with Applications to Detection Intruder. Search on Bibsonomy J. Comput. The full citation details ... 2014 DBLP  BibTeX  RDF
19László Blázovics, Tamás Lukovszki, Bertalan Forstner Surrounding Robots - A Discrete Localized Solution for the Intruder Problem -. Search on Bibsonomy J. Adv. Comput. Intell. Intell. Informatics The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Shibo He, Jiming Chen 0001, Junkun Li, Youxian Sun Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks Search on Bibsonomy 2014   DOI  RDF
19Tarem Ahmed, Al-Sakib Khan Pathan, Supriyo Ahmed Adaptive algorithms for automated intruder detection in surveillance networks. Search on Bibsonomy ICACCI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Hua Chen 0007, Krishna Kalyanam, Wei Zhang 0013, David W. Casbeer Continuous-time intruder isolation using Unattended Ground Sensors on graphs. Search on Bibsonomy ACC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Corneliu Rusu A sparsogram coding procedure for wildlife intruder detection. Search on Bibsonomy ISCCSP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Péter Bauer, Bálint Vanek, Tamas Peni, Tamás Zsedrovits, Borbala Jani Matyasne Pencz, Ákos Zarándy, Jozsef Bokor Aircraft trajectory tracking with large sideslip angles for sense and avoid intruder state estimation. Search on Bibsonomy MED The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Jaeseok Shim, Yujin Lim, Jaesung Park Geometric algorithm for height filtering in intruder monitoring system. Search on Bibsonomy ICOIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Soheil Keshmiri, Shahram Payandeh On Confinement of the Initial Location of an Intruder in a Multi-robot Pursuit Game. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Mathieu Baudet, Véronique Cortier, Stéphanie Delaune YAPA: A Generic Tool for Computing Intruder Knowledge. Search on Bibsonomy ACM Trans. Comput. Log. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Keita Ushiki, Kentaro Nishimori, Naoki Honma, Hideo Makino Intruder Detection Performance of SIMO and MIMO Sensors with Same Number of Channel Responses. Search on Bibsonomy IEICE Trans. Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Murat Moran, James Heather Automated Analysis of Voting Systems with Dolev-Yao Intruder Model. Search on Bibsonomy Electron. Commun. Eur. Assoc. Softw. Sci. Technol. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Kyungmin Kim, Kwang-Il Park, Yewon Jeong, June Seok Hong, Hak-Jin Kim, Wooju Kim HMM and Rule-Based Hybrid Intruder Detection Approach by Synthesizing Decisions of Sensors. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Hector M. Lugo-Cordero, Ratan K. Guha What defines an intruder? An intelligent approach. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Damla Turgut, Ladislau Bölöni IVE: Improving the value of information in energy-constrained intruder tracking sensor networks. Search on Bibsonomy ICC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Ofrit Lesser, Lena Tenenboim-Chekina, Lior Rokach, Yuval Elovici Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks. Search on Bibsonomy SBP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Corneliu Rusu, Marius Vasile Ghiurcau, Marius Sirbu, Radu Ciprian Bilcu, Jaakko Astola On the design of an acoustic based wildlife intruder detection system. Search on Bibsonomy SpeD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Jirí Minár, Kamil Ríha, Hejun Tong Intruder detection for automated access control systems with Kinect device. Search on Bibsonomy TSP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Nicola Basilico, Nicola Gatti 0001, Francesco Amigoni Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder. Search on Bibsonomy Artif. Intell. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Tal Ben-Zvi, Jeffrey V. Nickerson Intruder Detection: An Optimal Decision Analysis Strategy. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part C The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, Al-Sakib Khan Pathan Automated Intruder Detection from Image Sequences using Minimum Volume Sets. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2012 DBLP  BibTeX  RDF
19Lemonia Dritsoula, Patrick Loiseau, John Musacchio A Game-Theoretical Approach for Finding Optimal Strategies in an Intruder Classification Game Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
19Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani Intruder deducibility constraints with negation. Decidability and application to secured service compositions Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
19Lemonia Dritsoula, Patrick Loiseau, John Musacchio Computing the Nash Equilibria of Intruder Classification Games. Search on Bibsonomy GameSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Damla Turgut, Ladislau Bölöni A pragmatic value-of-information approach for intruder tracking sensor networks. Search on Bibsonomy ICC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Waseem Abbas, Magnus Egerstedt Securing multiagent systems against a sequence of intruder attacks. Search on Bibsonomy ACC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Markus Spindler, Fabio Pasqualetti, Francesco Bullo Distributed multi-camera synchronization for smart-intruder detection. Search on Bibsonomy ACC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 629 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license