|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 213 occurrences of 169 keywords
|
|
|
Results
Found 349 publication records. Showing 349 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Avrim Blum, Dawn Xiaodong Song, Shobha Venkataraman |
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
Random walks, Network intrusion detection, Stepping stones, Evasion, Interactive sessions |
12 | Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato |
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
Layered networks, PCA, Anomaly detection, User behavior, Co-occurrence matrix |
12 | Fábio Elias Locatelli, Luciano Paschoal Gaspary, Cristina Melchiors, Samir Lohmann, Fabiane Dillenburg |
Spotting Intrusion Scenarios from Firewall Logs Through a Case-Based Reasoning Approach. |
DSOM |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Marcos Laureano, Carlos Maziero, Edgard Jamhour |
Intrusion Detection in Virtual Machine Environments. |
EUROMICRO |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Khin Mi Mi Aung, Jong Sou Park |
Software Rejuvenation Approach to Security Engineering. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Iyad Kuwatly, Malek Sraj, Zaid Al Masri, Hassan Artail |
A Dynamic Honeypot Design for Intrusion Detection. |
ICPS |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Khin Mi Mi Aung, Jong Sou Park |
A Framework of Software Rejuvenation for Survivability. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Christopher Krügel, William K. Robertson, Giovanni Vigna |
Detecting Kernel-Level Rootkits Through Binary Analysis. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Luciano Paschoal Gaspary, Cristina Melchiors, Fábio Elias Locatelli, Fabiane Dillenburg |
Identification of Intrustion Scenarios through Classification, Characterization and Analysis of Firewall Events. |
LCN |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Sotiris E. Nikoletseas, Grigorios Prasinos, Paul G. Spirakis, Christos D. Zaroliagis |
Attack Propagation in Networks. |
Theory Comput. Syst. |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Sankalp Singh, Michel Cukier, William H. Sanders |
Probabilistic Validation of an Intrusion-Tolerant Replication System. |
DSN |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Xinyuan Wang 0005, Douglas S. Reeves |
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
intrusion tracing, robustness, correlation, stepping stones |
12 | Giorgio Giacinto, Fabio Roli, Luca Didaci |
A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks. |
Multiple Classifier Systems |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Maria Andersson |
Classification of Aerial Missions Using Hidden Markov Models. |
ECSQARU |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Sung Kim, Farokh B. Bastani, I-Ling Yen, Ing-Ray Chen |
High-Assurance Synthesis of Security Services from Basic Microservices. |
ISSRE |
2003 |
DBLP DOI BibTeX RDF |
Microservices, Software architecture, Software composition, Security service |
12 | Kathia Regina L. Jucá, Azzedine Boukerche, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare |
Human Immune Anomaly and Misuse Based Detection for Computer System Operations: PART II. |
IPDPS |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Nicolas Labroche, Nicolas Monmarché, Gilles Venturini |
Visual Clustering with Artificial Ants Colonies. |
KES |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar |
On-the-fly Intrusion Detection for Web Portals. |
ITCC |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Wei T. Yue, Amitava Bagchi |
Tuning the Quality Parameters of a Firewall to Maximize Net Benefit. |
IWDC |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Soroush Sedaghat, Josef Pieprzyk, Ehsan Vossough |
On-the-fly web content integrity check boosts users's confidence. |
Commun. ACM |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Antonella Branca, Paolo Spagnolo, Giovanni Attolico, Arcangelo Distante |
Human motion tracking in outdoor environment. |
ICARCV |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Kathia Regina L. Jucá, Azzedine Boukerche, João Bosco M. Sobral |
Intrusion Detection Based on the Immune Human System. |
IPDPS |
2002 |
DBLP DOI BibTeX RDF |
|
12 | David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford |
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Xinyuan Wang 0005, Douglas S. Reeves, Shyhtsun Felix Wu |
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
12 | R. K. Shyamasundar |
Analyzing Cryptographic Protocols in a Reactive Framework. |
VMCAI |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto |
Editorial. |
Int. J. Inf. Sec. |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Horatiu Cirstea |
Specifying Authentication Protocols Using Rewriting and Strategies. |
PADL |
2001 |
DBLP DOI BibTeX RDF |
model-checking, strategy, rewriting, authentication protocols |
12 | Kai Hwang 0001, Muralidaran Gangadharan |
Micro-Firewalls for Dynamic Network Security with Distributed Intrusion Detection. |
NCA |
2001 |
DBLP DOI BibTeX RDF |
|
12 | April Kwong, Michael Gertz 0001 |
Authentic Publication of XML Document Data. |
WISE (1) |
2001 |
DBLP DOI BibTeX RDF |
authentic data publication, XML, data integrity |
12 | Michaël Rusinowitch, Mathieu Turuani |
Protocol Insecurity with Finite Number of Sessions is NP-Complete. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Soroush Sedaghat, Josef Pieprzyk, Ehsan Vossough |
A Dynamic Web Agent for Verifying the Security and Integrity of a Web Site's Contents. |
CSCWD |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Josef Scharinger |
Construction of Data Dependent Chaotic Permutation Hashes to Ensure Communications Integrity. |
ICN (2) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Xavier Hannotin, Paolo Maggi, Riccardo Sisto |
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study. |
Mobile Agents |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Anita K. Jones, Yu Lin |
Application Intrusion Detection using Language Library Calls. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Sang-Min Park, Kyung-Yong Chwa, Jae-Ha Lee |
Characterization of Rooms Searchable by Two Guards. |
ISAAC |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Yi-Min Wang, Wilf Russell, Anish Arora, Rajesh Jagannathan, Jun Xu |
Towards Dependable Home Networking: An Experience Report. |
DSN |
2000 |
DBLP DOI BibTeX RDF |
Power line control, Lookup service, Publish/subscribe eventing, Heterogeneous protocols, Security, Reliability, Manageability, Dependability, Self-stabilization, Extensibility, Heterogeneous networks, Home networking, Remote control, Home automation, Heterogeneous devices, Heartbeats, Soft states, Device discovery |
12 | Paulo Peixoto, João Gonçalves, Hugo Antunes, Jorge Batista 0001, Helder Araújo |
A Surveillance System Integrating Visual Telepresence. |
ICPR |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Hagen Ploog, Mathias Schmalisch, Dirk Timmermann |
Security Upgrade of Existing ISDN Devices by Using Reconfigurable Logic. |
FPL |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Heejin Jang, Sangwook Kim |
A Self-Extension Monitoring for Security Management. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare |
12 | Daniel Barbará, Rajni Goel, Sushil Jajodia |
Using Checksums to Detect Data Corruption. |
EDBT |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Johann Schumann |
PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols. |
CAV |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Catherine Meadows 0001 |
A Formal Framework and Evaluation Method for Network Denial of Service. |
CSFW |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Tetsuji Takada, Hideki Koike |
NIGELOG: Protecting Logging Information by Hiding Multiple Backups in Directories. |
DEXA Workshops |
1999 |
DBLP DOI BibTeX RDF |
log information protection methods, restorable lost log information, hiding backups |
12 | Richard C. Linger, Nancy R. Mead, Howard F. Lipson |
Requirements Definition for Survivable Network Systems. |
ICRE |
1998 |
DBLP DOI BibTeX RDF |
|
12 | Dominique Bolignano |
Towards the Formal Verification of Electronic Commerce Protocols. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
|
12 | Marc Mehdi Ayadi, Dominique Bolignano |
Verification of Cryptographic Protocols: An Experiment. |
FME |
1997 |
DBLP DOI BibTeX RDF |
security, formal methods, cryptographic protocols, Coq |
12 | Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk |
Case-Based Reasoning for Intrusion Detection. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
model based expert systems, case based reasoning approach, artificial intelligence, intrusion detection, authorisation |
12 | Jean-Charles Fabre, Brian Randell |
An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
12 | Ralf C. Hauser, E. Stewart Lee |
Verification and Modelling of Authentication Protocols. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #349 of 349 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4] |
|