The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for intruders with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-1998 (15) 1999-2000 (15) 2001-2002 (22) 2003-2004 (35) 2005 (35) 2006 (32) 2007 (41) 2008 (37) 2009 (20) 2010-2012 (18) 2013-2015 (21) 2016-2017 (19) 2018-2020 (19) 2021-2023 (20)
Publication types (Num. hits)
article(79) incollection(3) inproceedings(266) phdthesis(1)
Venues (Conferences, Journals, ...)
CoRR(9) ACSAC(6) IROS(6) Sensors(5) ESORICS(4) HICSS(4) IPSN(4) ISC(4) RAID(4) AINA(3) ATC(3) CCS(3) Comput. Networks(3) Comput. Secur.(3) CSFW(3) IAS(3) More (+10 of total 264)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 213 occurrences of 169 keywords

Results
Found 349 publication records. Showing 349 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
12Honggang Wang 0001, Dongming Peng, Wei Wang 0015, Hamid Sharif, Hsiao-Hwa Chen Energy-Aware Adaptive Watermarking for Real-Time Image Delivery in Wireless Sensor Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Luiz Filipe M. Vieira, Uichin Lee, Mario Gerla Phero-Trail: a bio-inspired location service for mobile underwater sensor networks. Search on Bibsonomy Underwater Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF geographic location services, pheromone trail, mobile networks, convex hull, underwater sensor networks
12Pinar Heggernes, Rodica Mihai Mixed Search Number of Permutation Graphs. Search on Bibsonomy FAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Sanjeev Kumar, Einar Petana Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Denial of Service (DoS) attacks, TCP SYN attack, Windows XP Service Pack2 operating system, Internet Security
12Ying-Wei Kuo, Shou-Hsuan Stephen Huang An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets. Search on Bibsonomy ICPADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Rakesh Nayak, C. V. Sastry, Jayaram Pradhan A matrix formulation for NTRU cryptosystem. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Kyung Joon Kwak, Yuliy M. Baryshnikov, Edward G. Coffman Jr. Self-Organizing Sleep-Wake Sensor Systems. Search on Bibsonomy SASO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Han-Ching Wu, Shou-Hsuan Stephen Huang Performance of Neural Networks in Stepping-Stone Intrusion Detection. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Youngsoo Kim, Jonggu Kang, Daeyoung Kim 0001, Eunjo Kim, Pohkit Chong, Suckbin Seo Design of a fence surveillance system based on wireless sensor networks. Search on Bibsonomy Autonomics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor network, distributed system, autonomous system
12Chao-Hsi Yeh, Chung-Huang Yang Design and implementation of honeypot systems based on open-source software. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang, Sajal Bhatia, Saurabh Gupta Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Proxy Logs, Linkage Analyses, Computer Crime, Network attack
12Yuji Katsumata, Yoshiteru Ishida On a Membrane Formation in a Spatio-temporally Generalized Prisoner's Dilemma. Search on Bibsonomy ACRI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF spatial prisoner’s dilemma, generalized prisoner’s dilemma, second order cellular automata, membrane formation, maintenance of cooperating clusters
12ChingSeong Tan, Aryuanto Soetedjo Feasibility Study on An Automated Intruder Detection for Tropical Fish Farm. Search on Bibsonomy RAM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Wen-Chung Kuo Comments on "A Multikey Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design, and Implementation". Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Ting He 0001, Lang Tong Detecting Encrypted Stepping-Stone Connections. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Akarun Surveillance Wireless Sensor Networks: Deployment Quality Analysis. Search on Bibsonomy IEEE Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Thomas Hammel, Mark Rich A higher capability sensor node platform suitable for demanding applications. Search on Bibsonomy IPSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF low power wireless systems, wireless sensor network, networking protocols, mesh networking
12Gang Wu, Fanglu Guo, Tzi-cker Chiueh Transparent and Accurate Traffic Load Estimation for EnterpriseWireless LAN. Search on Bibsonomy NCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch Verifying Cryptographic Protocols with Subterms Constraints. Search on Bibsonomy LPAR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan A Secure Authenticated Key Agreement Protocol For Wireless Security. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Sandip Sen, Sabyasachi Saha, Stéphane Airiau, Teddy Candale, Dipyaman Banerjee, Doran Chakraborty, Partha Mukherjee, Anil Gürsel Robust Agent Communities. Search on Bibsonomy AIS-ADM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Andreas Kolling, Stefano Carpin The GRAPH-CLEAR problem: definition, theoretical properties and its connections to multirobot aided surveillance. Search on Bibsonomy IROS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Amel Meddeb, Yacine Djemaiel, Noureddine Boudriga Global intrusion detection and tolerance in networked systems. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF disk-based intrusion detection, global detection, local detection, tolerance, distributed attacks
12Leonardo M. Trejos, Masaru Kamada, Tatsuhiro Yonekura, Mamun Bin Ibne Reaz Wildlife net-gamekeepers using sensor network. Search on Bibsonomy NETGAMES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF game modification, nature conservation, pattern recognition, network monitoring
12Przemyslaw Krekora An approach to change availability of the service by adding forecasting module to firewall. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Boting Yang, Yi Cao Directed Searching Digraphs: Monotonicity and Complexity. Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Haidong Fu, Xiguo Yuan, Kui Zhang, Xiaolong Zhang 0002, Qi Xie Investigating Novel Immune-Inspired Multi-agent Systems for Anomaly Detection. Search on Bibsonomy APSCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Ji Ma 0001, Mehmet A. Orgun Specifying Agent Beliefs for Authentication Systems. Search on Bibsonomy ECUMN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark Green 0001, Miguel Ángel García-Ruíz Toward Sound-Assisted Intrusion Detection Systems. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion detection, computer networks, multimodal interfaces, human-computer interfaces, computer forensics
12Melek Önen, Refik Molva Secure Data Aggregation with Multiple Encryption. Search on Bibsonomy EWSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Peter Csaba Ölveczky, Martin Grimeland Formal Analysis of Time-Dependent Cryptographic Protocols in Real-Time Maude. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Elie Bursztein, Jean Goubault-Larrecq A Logical Framework for Evaluating Network Resilience Against Faults and Attacks. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Xuxian Jiang, Xinyuan Wang 0005 "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Vivek K. Singh 0001, Mohan S. Kankanhalli Towards Adversary Aware Surveillance Systems. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Alessio Dore, Matteo Pinasco, Carlo S. Regazzoni A Bio-inspired Learning Approach for the Classification of Risk Zones in a Smart Space. Search on Bibsonomy CVPR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Gang Wu, Tzi-cker Chiueh Passive and accurate traffic load estimation for infrastructure-mode wireless lan. Search on Bibsonomy MSWiM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF traffic load estimation, wireless lan management, passive monitoring
12Ali Sabbir, Kaliappa Ravindran, Kevin A. Kwiat Secure Distributed Agreement Protocols for Information Assurance Applications. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Su Thawda Win, Thandar Thein, Jong Sou Park To Increase Survivability with Software Rejuvenation by Having Dual Base Station in WSN Environment. Search on Bibsonomy ISPA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Samuel R. Barrett Optimizing Sensor Placement for Intruder Detection with Genetic Algorithms. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Jae-Hyeok Jang, Myung-Chan Park, Young-Shin Park, Byoung-Soo Koh, Yong-Rak Choi A Mechanism for Securing Digital Evidences in Pervasive Environments. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum A framework for misuse detection in ad hoc networks- part II. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum A framework for misuse detection in ad hoc Networks-part I. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Eoghan Casey Investigating sophisticated security breaches. Search on Bibsonomy Commun. ACM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Tom Chothia, Simona Orzan, Jun Pang 0001, Muhammad Torabi Dashti A Framework for Automatically Checking Anonymity with mu CRL. Search on Bibsonomy TGC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Xiangdong An 0001, Dawn N. Jutla, Nick Cercone Probabilistic Internal Privacy Intrusion Detection. Search on Bibsonomy IDEAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Artem Vorobiev, Jun Han 0004 Secrobat: Secure and Robust Component-based Architectures. Search on Bibsonomy APSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Jianhua Yang, Yongzhong Zhang Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCP packet-matching, intrusion detection, Network security, round-trip time, stepping-stone
12Lihua Yu, Gang Chen 0001, Ke Chen 0005, Jinxiang Dong Securely Sharing Data in Encrypted Databases. Search on Bibsonomy CSCWD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Ming Li 0002, Huamin Feng Chaotically Masking Traffic Pattern to Prevent Traffic Pattern Analysis Attacks for Mission Critical Applications in Computer Communication Networks. Search on Bibsonomy ICNC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Claudiu Duma, Martin Karresand, Nahid Shahmehri, Germano Caronni A Trust-Aware, P2P-Based Overlay for Intrusion Detection. Search on Bibsonomy DEXA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Xiangdong An 0001, Dawn N. Jutla, Nick Cercone A Bayesian Network Approach to Detecting Privacy Intrusion. Search on Bibsonomy IAT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Mookyung Park, Namsu Moon, Sangrim Ryu, Jeongpyo Kong, Yongjin Lee, Wangjin Mun A Pixel-Weighting Method for Discriminating Objects of Different Sizes in an Image Captured from a Single Camera. Search on Bibsonomy CRV The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12T. Srinivasan 0001, V. Mahadevan, A. Meyyappan, A. Manikandan, M. Nivedita, N. Pavithra Hybrid Agents for Power-Aware Intrusion Detection in Highly Mobile Ad Hoc Networks. Search on Bibsonomy ICSNC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Sergio Ilarri, Ouri Wolfson, Eduardo Mena, Arantza Illarramendi, Naphtali Rishe Processing of Data Streams with Prediction Functions. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Ann Nosseir, Richard Connor 0001, Karen Renaud Question-based group authentication. Search on Bibsonomy OZCHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, human factors, computers and society, web-based services, social and behavioral sciences
12Annie De Montigny-Leboeuf, Tim Symchych Network Traffic Flow Analysis. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Josep Domingo-Ferrer, Francesc Sebé Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Clustering, Privacy-preserving data mining, Statistical disclosure control, Statistical databases, Microaggregation
12Ming Dong Wan, Shou-Hsuan Stephen Huang, Jianhua Yang Finding the Longest Similar Subsequence of Thumbprints for Intrusion Detection. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Young-Koo Lee, Sungyoung Lee An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Jianhua Yang, Byong Lee, Yongzhong Zhang Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF intrusion detection, Network security, round-trip time, stepping-stone
12Gregory B. Newby Paths to creativity in security careers. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Charis Ermopoulos, William Yurcik NVision-PA: A Process Accounting Analysis Tool with a Security Focus on Masquerade Detection in HPC Clusters. Search on Bibsonomy CLUSTER The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Yuh-Min Tseng Efficient authenticated key agreement protocols resistant to a denial-of-service attack. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Wensheng Zhang 0001, Guohong Cao Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks. Search on Bibsonomy MobiQuitous The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12V. Natarajan, Aruna Balasubramanian, Sumita Mishra, Ramalingam Sridhar Security for Energy Constrained RFID System. Search on Bibsonomy AutoID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Krzysztof Cetnarowicz, Renata Cieciwa, Gabriel Rojek Behavior Evaluation with Actions' Sampling in Multi-agent System. Search on Bibsonomy CEEMAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Michael Attig, John W. Lockwood A framework for rule processing in reconfigurable network systems (abstract only). Search on Bibsonomy FPGA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Thomas Stibor, Jonathan Timmis, Claudia Eckert 0001 On the appropriateness of negative selection defined over Hamming shape-space as a network intrusion detection system. Search on Bibsonomy Congress on Evolutionary Computation The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Deepak Kapur, Paliath Narendran, Lida Wang A Unification Algorithm for Analysis of Protocols with Blinded Signatures. Search on Bibsonomy Mechanizing Mathematical Reasoning The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Dean A. Jones, Mark A. Turnquist, Linda K. Nozick Simulation of imperfect information in vulnerability modeling for infrastructure facilities. Search on Bibsonomy WSC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Jun Li 0001, Toby Ehrenkranz, Geoffrey H. Kuenning, Peter L. Reiher Simulation and Analysis on the Resiliency and Efficiency of Malnets. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Michael Attig, John W. Lockwood A Framework for Rule Processing in Reconfigurable Network Systems. Search on Bibsonomy FCCM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Purui Su, Dequan Li, Haipeng Qu, Dengguo Feng Detecting the Deviations of Privileged Process Execution. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Fang-Yie Leu, Wei-Jie Yang, Wen-Kui Chang IFTS: Intrusion Forecast and Traceback based on Union Defense Environment. Search on Bibsonomy ICPADS (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Jianhua Yang, Shou-Hsuan Stephen Huang Improved Thumbprint and Its Application for Intrusion Detection. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Pradeep Kannadiga, Mohammad Zulkernine DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. Search on Bibsonomy SNPD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security and distributed systems, mobile agents, Intrusion detection, distributed attacks
12Gabriel Rojek, Renata Cieciwa, Krzysztof Cetnarowicz Algorithm of Behavior Evaluation in Multi-agent System. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Ping Yi, YiPing Zhong, Shiyong Zhang Applying Mobile Agent to Intrusion Response for Ad Hoc Networks. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12William Yurcik, Chao Liu 0001 A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. Search on Bibsonomy CCGRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Yi Tang 0001, Liankuan Zhang Adaptive Bucket Formation in Encrypted Databases. Search on Bibsonomy EEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki Towards Modeling Wireless Location Privacy. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Gregory B. White, David J. DiCenso Information Sharing Needs for National Security. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Ping Yi, Zhoulin Dai, YiPing Zhong, Shiyong Zhang Resisting Flooding Attacks in Ad Hoc Networks. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang 0005 Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Xin Zhao 0016, Kevin Borders, Atul Prakash 0001 Towards Protecting Sensitive Files in a Compromised System. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Takashi Minohara, Satoshi Ishikawa, Masahiro Amano Centralized Surveillance of Unused Address Space by using Virtual Networks. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Mohammed S. Alam, Abhishek Gupta, Jake Wires, Son Thanh Vuong APHIDS++: Evolution of A Programmable Hybrid Intrusion Detection System. Search on Bibsonomy MATA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Lingjun Meng, Peter van der Putten, Haiyang Wang A Comprehensive Benchmark of the Artificial Immune Recognition System (AIRS). Search on Bibsonomy ADMA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Symon S. Chang, Min S. Chiang An e-intelligence approach to e-commerce intrusion detection. Search on Bibsonomy GrC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Taghi M. Khoshgoftaar, Mohamed E. Abushadi Resource-Sensitive Intrusion Detection Models for Network Traffic. Search on Bibsonomy HASE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cost-sensitive resource-based intrusion detection, modified expected cost of misclassification, network security, decision trees
12Michele Bugliesi, Riccardo Focardi, Matteo Maffei Authenticity by tagging and typing. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, static analysis, process calculi
12Xinyuan Wang The loop fallacy and serialization in tracing intrusion connections through stepping stones. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF intrusion tracing, correlation, serialization, stepping stones
12Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Network Domain Security, Mobile Networks, UMTS, PKI, IPsec, SSL/TLS
12Ai Poh Loh, Feng Guan, Shuzhi Sam Ge Motion estimation using audio and video fusion. Search on Bibsonomy ICARCV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Paolo Lombardi, Bertrand Y. Zavidovique Architectural Design Issues for Bayesian Contextual Vision. Search on Bibsonomy ICPR (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Michele Bugliesi, Riccardo Focardi, Matteo Maffei Compositional Analysis of Authentication Protocols. Search on Bibsonomy ESOP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Andrew Howard 0001, Lynne E. Parker, Gaurav S. Sukhatme The SDR Experience: Experiments with a Large-Scale Heterogeneous Mobile Robot Team. Search on Bibsonomy ISER The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Wei Yuan, Srikanth V. Krishnamurthy, Satish K. Tripathi Improving the reliability of event reports in wireless sensor networks. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Dimitar P. Guelev, Mark Ryan 0001, Pierre-Yves Schobbens Model-Checking Access Control Policies. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 349 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license