Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Honggang Wang 0001, Dongming Peng, Wei Wang 0015, Hamid Sharif, Hsiao-Hwa Chen |
Energy-Aware Adaptive Watermarking for Real-Time Image Delivery in Wireless Sensor Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Luiz Filipe M. Vieira, Uichin Lee, Mario Gerla |
Phero-Trail: a bio-inspired location service for mobile underwater sensor networks. |
Underwater Networks |
2008 |
DBLP DOI BibTeX RDF |
geographic location services, pheromone trail, mobile networks, convex hull, underwater sensor networks |
12 | Pinar Heggernes, Rodica Mihai |
Mixed Search Number of Permutation Graphs. |
FAW |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Sanjeev Kumar, Einar Petana |
Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
Denial of Service (DoS) attacks, TCP SYN attack, Windows XP Service Pack2 operating system, Internet Security |
12 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets. |
ICPADS |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Rakesh Nayak, C. V. Sastry, Jayaram Pradhan |
A matrix formulation for NTRU cryptosystem. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Kyung Joon Kwak, Yuliy M. Baryshnikov, Edward G. Coffman Jr. |
Self-Organizing Sleep-Wake Sensor Systems. |
SASO |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Han-Ching Wu, Shou-Hsuan Stephen Huang |
Performance of Neural Networks in Stepping-Stone Intrusion Detection. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Youngsoo Kim, Jonggu Kang, Daeyoung Kim 0001, Eunjo Kim, Pohkit Chong, Suckbin Seo |
Design of a fence surveillance system based on wireless sensor networks. |
Autonomics |
2008 |
DBLP DOI BibTeX RDF |
sensor network, distributed system, autonomous system |
12 | Chao-Hsi Yeh, Chung-Huang Yang |
Design and implementation of honeypot systems based on open-source software. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang, Sajal Bhatia, Saurabh Gupta |
Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
Proxy Logs, Linkage Analyses, Computer Crime, Network attack |
12 | Yuji Katsumata, Yoshiteru Ishida |
On a Membrane Formation in a Spatio-temporally Generalized Prisoner's Dilemma. |
ACRI |
2008 |
DBLP DOI BibTeX RDF |
spatial prisoner’s dilemma, generalized prisoner’s dilemma, second order cellular automata, membrane formation, maintenance of cooperating clusters |
12 | ChingSeong Tan, Aryuanto Soetedjo |
Feasibility Study on An Automated Intruder Detection for Tropical Fish Farm. |
RAM |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Wen-Chung Kuo |
Comments on "A Multikey Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design, and Implementation". |
IEEE Trans. Multim. |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Ting He 0001, Lang Tong |
Detecting Encrypted Stepping-Stone Connections. |
IEEE Trans. Signal Process. |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Akarun |
Surveillance Wireless Sensor Networks: Deployment Quality Analysis. |
IEEE Netw. |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Thomas Hammel, Mark Rich |
A higher capability sensor node platform suitable for demanding applications. |
IPSN |
2007 |
DBLP DOI BibTeX RDF |
low power wireless systems, wireless sensor network, networking protocols, mesh networking |
12 | Gang Wu, Fanglu Guo, Tzi-cker Chiueh |
Transparent and Accurate Traffic Load Estimation for EnterpriseWireless LAN. |
NCA |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch |
Verifying Cryptographic Protocols with Subterms Constraints. |
LPAR |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan |
A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan |
A Secure Authenticated Key Agreement Protocol For Wireless Security. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Sandip Sen, Sabyasachi Saha, Stéphane Airiau, Teddy Candale, Dipyaman Banerjee, Doran Chakraborty, Partha Mukherjee, Anil Gürsel |
Robust Agent Communities. |
AIS-ADM |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Andreas Kolling, Stefano Carpin |
The GRAPH-CLEAR problem: definition, theoretical properties and its connections to multirobot aided surveillance. |
IROS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Amel Meddeb, Yacine Djemaiel, Noureddine Boudriga |
Global intrusion detection and tolerance in networked systems. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
disk-based intrusion detection, global detection, local detection, tolerance, distributed attacks |
12 | Leonardo M. Trejos, Masaru Kamada, Tatsuhiro Yonekura, Mamun Bin Ibne Reaz |
Wildlife net-gamekeepers using sensor network. |
NETGAMES |
2007 |
DBLP DOI BibTeX RDF |
game modification, nature conservation, pattern recognition, network monitoring |
12 | Przemyslaw Krekora |
An approach to change availability of the service by adding forecasting module to firewall. |
DepCoS-RELCOMEX |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Boting Yang, Yi Cao |
Directed Searching Digraphs: Monotonicity and Complexity. |
TAMC |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Haidong Fu, Xiguo Yuan, Kui Zhang, Xiaolong Zhang 0002, Qi Xie |
Investigating Novel Immune-Inspired Multi-agent Systems for Anomaly Detection. |
APSCC |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Ji Ma 0001, Mehmet A. Orgun |
Specifying Agent Beliefs for Authentication Systems. |
ECUMN |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark Green 0001, Miguel Ángel García-Ruíz |
Toward Sound-Assisted Intrusion Detection Systems. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
Intrusion detection, computer networks, multimodal interfaces, human-computer interfaces, computer forensics |
12 | Melek Önen, Refik Molva |
Secure Data Aggregation with Multiple Encryption. |
EWSN |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Peter Csaba Ölveczky, Martin Grimeland |
Formal Analysis of Time-Dependent Cryptographic Protocols in Real-Time Maude. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Elie Bursztein, Jean Goubault-Larrecq |
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks. |
ASIAN |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Xuxian Jiang, Xinyuan Wang 0005 |
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Vivek K. Singh 0001, Mohan S. Kankanhalli |
Towards Adversary Aware Surveillance Systems. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Alessio Dore, Matteo Pinasco, Carlo S. Regazzoni |
A Bio-inspired Learning Approach for the Classification of Risk Zones in a Smart Space. |
CVPR |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Gang Wu, Tzi-cker Chiueh |
Passive and accurate traffic load estimation for infrastructure-mode wireless lan. |
MSWiM |
2007 |
DBLP DOI BibTeX RDF |
traffic load estimation, wireless lan management, passive monitoring |
12 | Ali Sabbir, Kaliappa Ravindran, Kevin A. Kwiat |
Secure Distributed Agreement Protocols for Information Assurance Applications. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Su Thawda Win, Thandar Thein, Jong Sou Park |
To Increase Survivability with Software Rejuvenation by Having Dual Base Station in WSN Environment. |
ISPA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Samuel R. Barrett |
Optimizing Sensor Placement for Intruder Detection with Genetic Algorithms. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Jae-Hyeok Jang, Myung-Chan Park, Young-Shin Park, Byoung-Soo Koh, Yong-Rak Choi |
A Mechanism for Securing Digital Evidences in Pervasive Environments. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum |
A framework for misuse detection in ad hoc networks- part II. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum |
A framework for misuse detection in ad hoc Networks-part I. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Eoghan Casey |
Investigating sophisticated security breaches. |
Commun. ACM |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Tom Chothia, Simona Orzan, Jun Pang 0001, Muhammad Torabi Dashti |
A Framework for Automatically Checking Anonymity with mu CRL. |
TGC |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Xiangdong An 0001, Dawn N. Jutla, Nick Cercone |
Probabilistic Internal Privacy Intrusion Detection. |
IDEAS |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Artem Vorobiev, Jun Han 0004 |
Secrobat: Secure and Robust Component-based Architectures. |
APSEC |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Jianhua Yang, Yongzhong Zhang |
Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
TCP packet-matching, intrusion detection, Network security, round-trip time, stepping-stone |
12 | Lihua Yu, Gang Chen 0001, Ke Chen 0005, Jinxiang Dong |
Securely Sharing Data in Encrypted Databases. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Ming Li 0002, Huamin Feng |
Chaotically Masking Traffic Pattern to Prevent Traffic Pattern Analysis Attacks for Mission Critical Applications in Computer Communication Networks. |
ICNC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Claudiu Duma, Martin Karresand, Nahid Shahmehri, Germano Caronni |
A Trust-Aware, P2P-Based Overlay for Intrusion Detection. |
DEXA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Xiangdong An 0001, Dawn N. Jutla, Nick Cercone |
A Bayesian Network Approach to Detecting Privacy Intrusion. |
IAT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Mookyung Park, Namsu Moon, Sangrim Ryu, Jeongpyo Kong, Yongjin Lee, Wangjin Mun |
A Pixel-Weighting Method for Discriminating Objects of Different Sizes in an Image Captured from a Single Camera. |
CRV |
2006 |
DBLP DOI BibTeX RDF |
|
12 | T. Srinivasan 0001, V. Mahadevan, A. Meyyappan, A. Manikandan, M. Nivedita, N. Pavithra |
Hybrid Agents for Power-Aware Intrusion Detection in Highly Mobile Ad Hoc Networks. |
ICSNC |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Sergio Ilarri, Ouri Wolfson, Eduardo Mena, Arantza Illarramendi, Naphtali Rishe |
Processing of Data Streams with Prediction Functions. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Ann Nosseir, Richard Connor 0001, Karen Renaud |
Question-based group authentication. |
OZCHI |
2006 |
DBLP DOI BibTeX RDF |
security, human factors, computers and society, web-based services, social and behavioral sciences |
12 | Annie De Montigny-Leboeuf, Tim Symchych |
Network Traffic Flow Analysis. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Josep Domingo-Ferrer, Francesc Sebé |
Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation. |
Privacy in Statistical Databases |
2006 |
DBLP DOI BibTeX RDF |
Clustering, Privacy-preserving data mining, Statistical disclosure control, Statistical databases, Microaggregation |
12 | Ming Dong Wan, Shou-Hsuan Stephen Huang, Jianhua Yang |
Finding the Longest Similar Subsequence of Thumbprints for Intrusion Detection. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Young-Koo Lee, Sungyoung Lee |
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Jianhua Yang, Byong Lee, Yongzhong Zhang |
Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
intrusion detection, Network security, round-trip time, stepping-stone |
12 | Gregory B. Newby |
Paths to creativity in security careers. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Charis Ermopoulos, William Yurcik |
NVision-PA: A Process Accounting Analysis Tool with a Security Focus on Masquerade Detection in HPC Clusters. |
CLUSTER |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Yuh-Min Tseng |
Efficient authenticated key agreement protocols resistant to a denial-of-service attack. |
Int. J. Netw. Manag. |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Wensheng Zhang 0001, Guohong Cao |
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks. |
MobiQuitous |
2005 |
DBLP DOI BibTeX RDF |
|
12 | V. Natarajan, Aruna Balasubramanian, Sumita Mishra, Ramalingam Sridhar |
Security for Energy Constrained RFID System. |
AutoID |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Krzysztof Cetnarowicz, Renata Cieciwa, Gabriel Rojek |
Behavior Evaluation with Actions' Sampling in Multi-agent System. |
CEEMAS |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Michael Attig, John W. Lockwood |
A framework for rule processing in reconfigurable network systems (abstract only). |
FPGA |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Thomas Stibor, Jonathan Timmis, Claudia Eckert 0001 |
On the appropriateness of negative selection defined over Hamming shape-space as a network intrusion detection system. |
Congress on Evolutionary Computation |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Deepak Kapur, Paliath Narendran, Lida Wang |
A Unification Algorithm for Analysis of Protocols with Blinded Signatures. |
Mechanizing Mathematical Reasoning |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Dean A. Jones, Mark A. Turnquist, Linda K. Nozick |
Simulation of imperfect information in vulnerability modeling for infrastructure facilities. |
WSC |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Jun Li 0001, Toby Ehrenkranz, Geoffrey H. Kuenning, Peter L. Reiher |
Simulation and Analysis on the Resiliency and Efficiency of Malnets. |
PADS |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Michael Attig, John W. Lockwood |
A Framework for Rule Processing in Reconfigurable Network Systems. |
FCCM |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Purui Su, Dequan Li, Haipeng Qu, Dengguo Feng |
Detecting the Deviations of Privileged Process Execution. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Fang-Yie Leu, Wei-Jie Yang, Wen-Kui Chang |
IFTS: Intrusion Forecast and Traceback based on Union Defense Environment. |
ICPADS (1) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Jianhua Yang, Shou-Hsuan Stephen Huang |
Improved Thumbprint and Its Application for Intrusion Detection. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Pradeep Kannadiga, Mohammad Zulkernine |
DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. |
SNPD |
2005 |
DBLP DOI BibTeX RDF |
network security and distributed systems, mobile agents, Intrusion detection, distributed attacks |
12 | Gabriel Rojek, Renata Cieciwa, Krzysztof Cetnarowicz |
Algorithm of Behavior Evaluation in Multi-agent System. |
International Conference on Computational Science (3) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Ping Yi, YiPing Zhong, Shiyong Zhang |
Applying Mobile Agent to Intrusion Response for Ad Hoc Networks. |
International Conference on Computational Science (2) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | William Yurcik, Chao Liu 0001 |
A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. |
CCGRID |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Yi Tang 0001, Liankuan Zhang |
Adaptive Bucket Formation in Encrypted Databases. |
EEE |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki |
Towards Modeling Wireless Location Privacy. |
Privacy Enhancing Technologies |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Gregory B. White, David J. DiCenso |
Information Sharing Needs for National Security. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Ping Yi, Zhoulin Dai, YiPing Zhong, Shiyong Zhang |
Resisting Flooding Attacks in Ad Hoc Networks. |
ITCC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang 0005 |
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Xin Zhao 0016, Kevin Borders, Atul Prakash 0001 |
Towards Protecting Sensitive Files in a Compromised System. |
IEEE Security in Storage Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Takashi Minohara, Satoshi Ishikawa, Masahiro Amano |
Centralized Surveillance of Unused Address Space by using Virtual Networks. |
PRDC |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Mohammed S. Alam, Abhishek Gupta, Jake Wires, Son Thanh Vuong |
APHIDS++: Evolution of A Programmable Hybrid Intrusion Detection System. |
MATA |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Lingjun Meng, Peter van der Putten, Haiyang Wang |
A Comprehensive Benchmark of the Artificial Immune Recognition System (AIRS). |
ADMA |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Symon S. Chang, Min S. Chiang |
An e-intelligence approach to e-commerce intrusion detection. |
GrC |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Taghi M. Khoshgoftaar, Mohamed E. Abushadi |
Resource-Sensitive Intrusion Detection Models for Network Traffic. |
HASE |
2004 |
DBLP DOI BibTeX RDF |
cost-sensitive resource-based intrusion detection, modified expected cost of misclassification, network security, decision trees |
12 | Michele Bugliesi, Riccardo Focardi, Matteo Maffei |
Authenticity by tagging and typing. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
authentication, static analysis, process calculi |
12 | Xinyuan Wang |
The loop fallacy and serialization in tracing intrusion connections through stepping stones. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
intrusion tracing, correlation, serialization, stepping stones |
12 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
Network Domain Security, Mobile Networks, UMTS, PKI, IPsec, SSL/TLS |
12 | Ai Poh Loh, Feng Guan, Shuzhi Sam Ge |
Motion estimation using audio and video fusion. |
ICARCV |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Paolo Lombardi, Bertrand Y. Zavidovique |
Architectural Design Issues for Bayesian Contextual Vision. |
ICPR (1) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Michele Bugliesi, Riccardo Focardi, Matteo Maffei |
Compositional Analysis of Authentication Protocols. |
ESOP |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Andrew Howard 0001, Lynne E. Parker, Gaurav S. Sukhatme |
The SDR Experience: Experiments with a Large-Scale Heterogeneous Mobile Robot Team. |
ISER |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Wei Yuan, Srikanth V. Krishnamurthy, Satish K. Tripathi |
Improving the reliability of event reports in wireless sensor networks. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Dimitar P. Guelev, Mark Ryan 0001, Pierre-Yves Schobbens |
Model-Checking Access Control Policies. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|