The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for intruders with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-1998 (15) 1999-2000 (15) 2001-2002 (22) 2003-2004 (35) 2005 (35) 2006 (32) 2007 (41) 2008 (37) 2009 (20) 2010-2012 (18) 2013-2015 (21) 2016-2017 (19) 2018-2020 (19) 2021-2023 (20)
Publication types (Num. hits)
article(79) incollection(3) inproceedings(266) phdthesis(1)
Venues (Conferences, Journals, ...)
CoRR(9) ACSAC(6) IROS(6) Sensors(5) ESORICS(4) HICSS(4) IPSN(4) ISC(4) RAID(4) AINA(3) ATC(3) CCS(3) Comput. Networks(3) Comput. Secur.(3) CSFW(3) IAS(3) More (+10 of total 264)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 213 occurrences of 169 keywords

Results
Found 349 publication records. Showing 349 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
12Avrim Blum, Dawn Xiaodong Song, Shobha Venkataraman Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Random walks, Network intrusion detection, Stepping stones, Evasion, Interactive sessions
12Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Layered networks, PCA, Anomaly detection, User behavior, Co-occurrence matrix
12Fábio Elias Locatelli, Luciano Paschoal Gaspary, Cristina Melchiors, Samir Lohmann, Fabiane Dillenburg Spotting Intrusion Scenarios from Firewall Logs Through a Case-Based Reasoning Approach. Search on Bibsonomy DSOM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Marcos Laureano, Carlos Maziero, Edgard Jamhour Intrusion Detection in Virtual Machine Environments. Search on Bibsonomy EUROMICRO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Khin Mi Mi Aung, Jong Sou Park Software Rejuvenation Approach to Security Engineering. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Iyad Kuwatly, Malek Sraj, Zaid Al Masri, Hassan Artail A Dynamic Honeypot Design for Intrusion Detection. Search on Bibsonomy ICPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Khin Mi Mi Aung, Jong Sou Park A Framework of Software Rejuvenation for Survivability. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Christopher Krügel, William K. Robertson, Giovanni Vigna Detecting Kernel-Level Rootkits Through Binary Analysis. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Luciano Paschoal Gaspary, Cristina Melchiors, Fábio Elias Locatelli, Fabiane Dillenburg Identification of Intrustion Scenarios through Classification, Characterization and Analysis of Firewall Events. Search on Bibsonomy LCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Sotiris E. Nikoletseas, Grigorios Prasinos, Paul G. Spirakis, Christos D. Zaroliagis Attack Propagation in Networks. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Sankalp Singh, Michel Cukier, William H. Sanders Probabilistic Validation of an Intrusion-Tolerant Replication System. Search on Bibsonomy DSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Xinyuan Wang 0005, Douglas S. Reeves Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion tracing, robustness, correlation, stepping stones
12Giorgio Giacinto, Fabio Roli, Luca Didaci A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks. Search on Bibsonomy Multiple Classifier Systems The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Maria Andersson Classification of Aerial Missions Using Hidden Markov Models. Search on Bibsonomy ECSQARU The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Sung Kim, Farokh B. Bastani, I-Ling Yen, Ing-Ray Chen High-Assurance Synthesis of Security Services from Basic Microservices. Search on Bibsonomy ISSRE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Microservices, Software architecture, Software composition, Security service
12Kathia Regina L. Jucá, Azzedine Boukerche, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare Human Immune Anomaly and Misuse Based Detection for Computer System Operations: PART II. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Nicolas Labroche, Nicolas Monmarché, Gilles Venturini Visual Clustering with Artificial Ants Colonies. Search on Bibsonomy KES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Radu Sion, Mikhail J. Atallah, Sunil Prabhakar On-the-fly Intrusion Detection for Web Portals. Search on Bibsonomy ITCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Wei T. Yue, Amitava Bagchi Tuning the Quality Parameters of a Firewall to Maximize Net Benefit. Search on Bibsonomy IWDC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Soroush Sedaghat, Josef Pieprzyk, Ehsan Vossough On-the-fly web content integrity check boosts users's confidence. Search on Bibsonomy Commun. ACM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Antonella Branca, Paolo Spagnolo, Giovanni Attolico, Arcangelo Distante Human motion tracking in outdoor environment. Search on Bibsonomy ICARCV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Kathia Regina L. Jucá, Azzedine Boukerche, João Bosco M. Sobral Intrusion Detection Based on the Immune Human System. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Xinyuan Wang 0005, Douglas S. Reeves, Shyhtsun Felix Wu Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12R. K. Shyamasundar Analyzing Cryptographic Protocols in a Reactive Framework. Search on Bibsonomy VMCAI The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto Editorial. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Horatiu Cirstea Specifying Authentication Protocols Using Rewriting and Strategies. Search on Bibsonomy PADL The full citation details ... 2001 DBLP  DOI  BibTeX  RDF model-checking, strategy, rewriting, authentication protocols
12Kai Hwang 0001, Muralidaran Gangadharan Micro-Firewalls for Dynamic Network Security with Distributed Intrusion Detection. Search on Bibsonomy NCA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12April Kwong, Michael Gertz 0001 Authentic Publication of XML Document Data. Search on Bibsonomy WISE (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authentic data publication, XML, data integrity
12Michaël Rusinowitch, Mathieu Turuani Protocol Insecurity with Finite Number of Sessions is NP-Complete. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Soroush Sedaghat, Josef Pieprzyk, Ehsan Vossough A Dynamic Web Agent for Verifying the Security and Integrity of a Web Site's Contents. Search on Bibsonomy CSCWD The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Josef Scharinger Construction of Data Dependent Chaotic Permutation Hashes to Ensure Communications Integrity. Search on Bibsonomy ICN (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Xavier Hannotin, Paolo Maggi, Riccardo Sisto Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study. Search on Bibsonomy Mobile Agents The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Anita K. Jones, Yu Lin Application Intrusion Detection using Language Library Calls. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Sang-Min Park, Kyung-Yong Chwa, Jae-Ha Lee Characterization of Rooms Searchable by Two Guards. Search on Bibsonomy ISAAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Yi-Min Wang, Wilf Russell, Anish Arora, Rajesh Jagannathan, Jun Xu Towards Dependable Home Networking: An Experience Report. Search on Bibsonomy DSN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Power line control, Lookup service, Publish/subscribe eventing, Heterogeneous protocols, Security, Reliability, Manageability, Dependability, Self-stabilization, Extensibility, Heterogeneous networks, Home networking, Remote control, Home automation, Heterogeneous devices, Heartbeats, Soft states, Device discovery
12Paulo Peixoto, João Gonçalves, Hugo Antunes, Jorge Batista 0001, Helder Araújo A Surveillance System Integrating Visual Telepresence. Search on Bibsonomy ICPR The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Hagen Ploog, Mathias Schmalisch, Dirk Timmermann Security Upgrade of Existing ISDN Devices by Using Reconfigurable Logic. Search on Bibsonomy FPL The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Heejin Jang, Sangwook Kim A Self-Extension Monitoring for Security Management. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare
12Daniel Barbará, Rajni Goel, Sushil Jajodia Using Checksums to Detect Data Corruption. Search on Bibsonomy EDBT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Johann Schumann PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols. Search on Bibsonomy CAV The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
12Catherine Meadows 0001 A Formal Framework and Evaluation Method for Network Denial of Service. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
12Tetsuji Takada, Hideki Koike NIGELOG: Protecting Logging Information by Hiding Multiple Backups in Directories. Search on Bibsonomy DEXA Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF log information protection methods, restorable lost log information, hiding backups
12Richard C. Linger, Nancy R. Mead, Howard F. Lipson Requirements Definition for Survivable Network Systems. Search on Bibsonomy ICRE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
12Dominique Bolignano Towards the Formal Verification of Electronic Commerce Protocols. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
12Marc Mehdi Ayadi, Dominique Bolignano Verification of Cryptographic Protocols: An Experiment. Search on Bibsonomy FME The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security, formal methods, cryptographic protocols, Coq
12Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk Case-Based Reasoning for Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF model based expert systems, case based reasoning approach, artificial intelligence, intrusion detection, authorisation
12Jean-Charles Fabre, Brian Randell An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
12Ralf C. Hauser, E. Stewart Lee Verification and Modelling of Authentication Protocols. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #349 of 349 (100 per page; Change: )
Pages: [<<][1][2][3][4]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license