The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for IDS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1992 (34) 1993-1994 (22) 1995-1996 (22) 1997-1999 (16) 2000 (17) 2001 (26) 2002 (42) 2003 (49) 2004 (84) 2005 (143) 2006 (162) 2007 (158) 2008 (145) 2009 (120) 2010 (55) 2011 (28) 2012 (41) 2013 (41) 2014 (32) 2015 (36) 2016 (99) 2017 (28) 2018 (106) 2019 (114) 2020 (116) 2021 (110) 2022 (158) 2023 (173) 2024 (46)
Publication types (Num. hits)
article(491) book(2) data(3) incollection(6) inproceedings(1707) phdthesis(4) proceedings(10)
Venues (Conferences, Journals, ...)
BigDataSecurity/HPSC/IDS(307) CoRR(88) IDS(63) BigDataSecurity(36) IEEE Access(29) RAID(27) Comput. Secur.(16) ACSAC(15) AINA(14) IWCMC(14) ICC(13) ISI(13) Recent Advances in Intrusion D...(12) SAINT(10) Sensors(10) ARES(9) More (+10 of total 934)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1161 occurrences of 620 keywords

Results
Found 2227 publication records. Showing 2223 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
33Iksen Caglar, Deniz Turgay Altilar An Energy Efficient VM Allocation Approach for Data Centers. Search on Bibsonomy BigDataSecurity/HPSC/IDS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Anku Adhikari, Avesta Hojjati, Juanli Shen, Jui-Ting Hsu, William P. King, Marianne Winslett Trust Issues for Big Data about High-Value Manufactured Parts. Search on Bibsonomy BigDataSecurity/HPSC/IDS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Keke Gai, Meikang Qiu, Sam Adam Elnagdy Security-Aware Information Classifications Using Supervised Learning for Cloud-Based Cyber Risk Management in Financial Big Data. Search on Bibsonomy BigDataSecurity/HPSC/IDS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Li Ma, Lixin Tao, Yong Zhong, Keke Gai RuleSN: Research and Application of Social Network Access Control Model. Search on Bibsonomy BigDataSecurity/HPSC/IDS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Veena Reddy Reguri, Swetha Kogatam, Melody Moh Energy Efficient Traffic-Aware Virtual Machine Migration in Green Cloud Data Centers. Search on Bibsonomy BigDataSecurity/HPSC/IDS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Baijian Yang 0001, Tonglin Zhang A Scalable Meta-Model for Big Data Security Analyses. Search on Bibsonomy BigDataSecurity/HPSC/IDS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Hua Yin, Keke Gai, Zhijian Wang A Classification Algorithm Based on Ensemble Feature Selections for Imbalanced-Class Dataset. Search on Bibsonomy BigDataSecurity/HPSC/IDS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Wael Hosny Fouad Aly Adaptive Combinatorial Key Scheme for Mobile Heterogeneous Wireless Sensor Networks. Search on Bibsonomy BigDataSecurity/HPSC/IDS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Vicky Na Zhao, Melody Moh, Teng-Sheng Moh Contextual-Aware Hybrid Recommender System for Mixed Cold-Start Problems in Privacy Protection. Search on Bibsonomy BigDataSecurity/HPSC/IDS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Kutub Thakur, Md Liakat Ali, Keke Gai, Meikang Qiu Information Security Policy for E-Commerce in Saudi Arabia. Search on Bibsonomy BigDataSecurity/HPSC/IDS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
32Natalia Stakhanova, Ali A. Ghorbani 0001 Managing intrusion detection rule sets. Search on Bibsonomy EUROSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF detection rules, intrusion detection signatures
32Steffen Reidt, Mudhakar Srivatsa, Shane Balfe The fable of the bees: incentivizing robust revocation decision making in ad hoc networks. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bees, partially available, suicide, trust authority, game, incentive, revocation, reward
32Vadim D. Kotov, Vladimir I. Vasilyev Artificial immune system based intrusion detection system. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF negative selection algorithms, artificial immune system, intrusion detection system, system calls
32Julien Gaugaz, Jakub Zakrzewski 0002, Gianluca Demartini, Wolfgang Nejdl How to Trace and Revise Identities. Search on Bibsonomy ESWC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Christie I. Ezeife, Dan Zhang TidFP: Mining Frequent Patterns in Different Databases with Transaction ID. Search on Bibsonomy DaWaK The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Transaction id, Distributed Mining, Multiple Table Mining, Data mining, Frequent Patterns
32Elvis Pontes, Adilson Eduardo Guelfi IFS - Intrusion forecasting system based on collaborative architecture. Search on Bibsonomy ICDIM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Ioannis Sourdis, João Bispo, João M. P. Cardoso, Stamatis Vassiliadis Regular Expression Matching in Reconfigurable Hardware. Search on Bibsonomy J. Signal Process. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, pattern matching, regular expression, reconfigurable hardware
32Huijuan Lu, Jianguo Chen, Wei Wei Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion detection, Bayesian networks, Anomaly detection
32Zhan Jiuhua Intrusion Detection System Based on Data Mining. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Navneet Kumar Pandey, S. K. Gupta 0001, Shaveta Leekha Algebra for Capability Based Attack Correlation. Search on Bibsonomy WISTP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF capability model, intrusion detection, attack scenario
32Chunfu Jia, Deqiang Chen, Kai Lin The Application of the Relative Entropy Density Divergence in Intrusion Detection Models. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Frédéric Massicotte, Yvan Labiche, Lionel C. Briand Toward Automatic Generation of Intrusion Detection Verification Rules. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF True positive, DARPA dataset, Intrusion Detection System, False positive, Snort
32Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bhattacharya Testing Intrusion Detection Systems in MANET: A Comprehensive Study. Search on Bibsonomy CNSR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Meriam Ben Ghorbel, Mehdi Talbi, Mohamed Mejri Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira, Yongjin Kwon A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Jérôme Hugues, Bechir Zalila, Laurent Pautet, Fabrice Kordon Rapid Prototyping of Distributed Real-Time Embedded Systems Using the AADL and Ocarina. Search on Bibsonomy IEEE International Workshop on Rapid System Prototyping The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Fabrice Kordon, Jean-Baptiste Voron Rapid Prototyping of Intrusion Detection Systems. Search on Bibsonomy IEEE International Workshop on Rapid System Prototyping The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Anders Hansson, Gabriel Istrate, Shiva Prasad Kasiviswanathan Combinatorics of TCP reordering. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Zhiyong Liu 0001, Hong Qiao Hidden Markov Model Based Intrusion Detection. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Artem Vorobiev, Jun Han 0004 Security Attack Ontology for Web Services. Search on Bibsonomy SKG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Il-Yong Kim, Yoo-Sung Kim, Ki-Chang Kim Zone-Based Clustering for Intrusion Detection Architecture in Ad-Hoc Networks. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion detection architecture, Clustering, Ad-hoc Network
32A. H. M. Rezaul Karim, R. M. A. P. Rajatheva, Kazi M. Ahmed An efficient collaborative intrusion detection system for MANET using Bayesian Approach. Search on Bibsonomy MSWiM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MANET, intrusion detection system, Bayesian approach
32Alvaro A. Cárdenas, John S. Baras, Karl Seamon A Framework for the Evaluation of Intrusion Detection Systems. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim 0001 Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Pradeep Kannadiga, Mohammad Zulkernine DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. Search on Bibsonomy SNPD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security and distributed systems, mobile agents, Intrusion detection, distributed attacks
32Se-Yul Lee, Yong-Soo Kim, Woongjae Lee A Hybrid Network Model for Intrusion Detection Based on Session Patterns and Rate of False Errors. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Dong Seong Kim 0001, Ha-Nam Nguyen, Jong Sou Park Genetic Algorithm to Improve SVM Based Network Intrusion Detection System. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov, Alexander Ulanov Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Wing W. Y. Ng, Aki P. F. Chan, Daniel S. Yeung, Eric C. C. Tsang Construction of High Precision RBFNN with Low False Alarm for Detecting Flooding Based Denial of Service Attacks Using Stochastic Sensitivity Measure. Search on Bibsonomy ICMLC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Fernando Godínez, Dieter Hutter, Raúl Monroy Service Discrimination and Audit File Reduction for Effective Intrusion Detection. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Object Reduction, Intrusion Detection, Dimensionality Reduction, Misuse Detection
32Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong Han SCIDS: A Soft Computing Intrusion Detection System. Search on Bibsonomy IWDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Dong Seong Kim 0001, Jong Sou Park Network-Based Intrusion Detection with Support Vector Machines. Search on Bibsonomy ICOIN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32David A. Wagner 0001, Paolo Soto Mimicry attacks on host-based intrusion detection systems. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anomaly detection, host-based intrusion detection, evasion attacks
32Xinzhou Qin, Wenke Lee, Lundy M. Lewis, João B. D. Cabrera Integrating intrusion detection and network management. Search on Bibsonomy NOMS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
32Kulsoom Abdullah, John A. Copeland Tool update: high alarm count issues in IDS rainstorm. Search on Bibsonomy VizSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IDS alarm visualization, filtering network data, network security information visualization
31Safaa O. Al-Mamory, Hongli Zhang 0001 IDS alerts correlation using grammar-based approach. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Quan Qian, Rui Zhang 0013, Hongyi Che Object-oriented Case Representation and Its Application in IDS. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Álvaro Herrero 0001, Emilio Corchado Traffic Data Preparation for a Hybrid Network IDS. Search on Bibsonomy HAIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hybrid Artificial Intelligence Systems, Artificial Intelligence, Artificial Neural Networks, Unsupervised Learning, Network Intrusion Detection, Computer Network Security, Projection Methods
31Jorge Belenguer, Carlos Miguel Tavares Calafate A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Arnur G. Tokhtabayev, Victor A. Skormin Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anomaly Propagation, Intrusion detection, Markov Models
31Rafael Páez, Cristina Satizábal, Jordi Forné A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Ilija Basicevic, Miroslav Popovic, Vladimir Kovacevic Use of Publisher-Subscriber Design Pattern in Infrastructure of Distributed IDS Systems. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31David Duncombe, George M. Mohay, Andrew J. Clark Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF immunological., intrusion detection, alert correlation
31Youngok Jeong, Younggoo Han, Hyunwoo Kim, Woochul Shim, Jaehong Kim, Sehun Kim Cost-Effective IDS Operating Scheme in MANETs. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Mathieu Blanc, Jérémy Briffaut, Jean-François Lalande, Christian Toinard Distributed Control Enabling Consistent MAC Policies and IDS Based on a Meta-Policy Approach. Search on Bibsonomy POLICY The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Emmanuel Hooper Intelligent Autonomic Strategy to Attacks in Network Infrastructure Protection: Feedback Methods to IDS, Using Policies, Alert Filters and Firewall Packet Filters for Multiple Protocols. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Hilmi A. Lahoud, Xin Tang Information security labs in IDS/IPS for distance education. Search on Bibsonomy SIGITE Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF online labs, distance learning, remote labs
31Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li 0001 New Method for Intrusion Features Mining in IDS. Search on Bibsonomy ICIC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Feng Zhao, Qing-Hua Li, Yan-Bin Zhao Real Time Approaches for Time-Series Mining-Based IDS. Search on Bibsonomy GCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Uwe Aickelin, Peter J. Bentley, Steve Cayzer, Jungwon Kim, Julie McLeod Danger Theory: The Link between AIS and IDS? Search on Bibsonomy ICARIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Ricardo Staciarini Puttini, Jean-Marc Percher, Ludovic Mé, Olivier Camp, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, L. Javier García-Villalba A Modular Architecture for Distributed IDS in MANET. Search on Bibsonomy ICCSA (3) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Shahriar Najand, Douglas M. Blough, Glenn Healey Signal-to-Noise Ratio in the Reconstruction of the Intensity Dependent Spread (IDS) Filter. Search on Bibsonomy ICIP (1) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
29Sura Emanet, Gozde Karatas Baydogmus, Önder Demir An ensemble learning based IDS using Voting rule: VEL-IDS. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Yunfan Huang, Maode Ma ILL-IDS: An incremental lifetime learning IDS for VANETs. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Mahawish Fatima, Osama Rehman, Ibrahim M. H. Rehman Li-IDS: An Approach Towards a Lightweight IDS for Resource-Constrained IoT. Search on Bibsonomy SmartNets The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Farhad Mofidi, Sena Hounsinou, Gedare Bloom L-IDS: A lightweight hardware-assisted IDS for IoT systems to detect ransomware attacks. Search on Bibsonomy IoTDI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Komal Singh Gill, Sharad Saxena, Anju Sharma GTA-IDS: Game Theoretic Approach to Enhance IDS Detection in Cloud Environment. Search on Bibsonomy Comput. Informatics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Aliya Tabassum, Aiman Erbad, Wadha Lebda, Amr Mohamed 0001, Mohsen Guizani FEDGAN-IDS: Privacy-preserving IDS using GAN and Federated Learning. Search on Bibsonomy Comput. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Junwei Liang 0004, Maode Ma, Xu Tan GaDQN-IDS: A Novel Self-Adaptive IDS for VANETs Based on Bayesian Game Theory and Deep Reinforcement Learning. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Lisa Liu, Gints Engelen, Timothy M. Lynar, Daryl Essam, Wouter Joosen Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Yazan Otoum, Amiya Nayak AS-IDS: Anomaly and Signature Based IDS for the Internet of Things. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
29Marta Catillo, Andrea Del Vecchio, Luciano Ocone, Antonio Pecchia, Umberto Villano USB-IDS-1: a Public Multilayer Dataset of Labeled Network Flows for IDS Evaluation. Search on Bibsonomy DSN Workshops The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
29Navya Iyengar Evaluation of Network Based IDS and Deployment of multi-sensor IDS. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
29Subiksha Srinivasa Gopalan, Dharshini Ravikumar, Dino Linekar, Ali Raza, Maheen Hasib Balancing Approaches towards ML for IDS: A Survey for the CSE-CIC IDS Dataset. Search on Bibsonomy ICCSPA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29Felix Erlacher, Falko Dressler Testing IDS using GENESIDS: Realistic Mixed Traffic Generation for IDS Evaluation. Search on Bibsonomy SIGCOMM Posters and Demos The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Rainer Bye Group-based IDS Collaboration Framework (A Case Study of the Artificial Immune System) (Gruppenbasiertes IDS Kollaborationsrahmenwerk) (eine Fallstudie über das Künstliche Immunsystem) Search on Bibsonomy 2013   RDF
29Karim Tabia, Philippe Leray 0001 Handling IDS' Reliability in Alert Correlation - A Bayesian Network-based Model for Handling IDS's Reliability and Controlling Prediction/False Alarm Rate Tradeoffs. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
26Rahul Khanna, Huaping Liu Distributed and control theoretic approach to intrusion detection. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hidden markov models, intrusion detection, wireless ad-hoc networks, IDS
26Rahul Khanna, Huaping Liu System approach to intrusion detection using hidden Markov model. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hidden Markov models, wireless ad hoc networks, IDS
26Byung-Joo Kim, Il Kon Kim Improved Realtime Intrusion Detection System. Search on Bibsonomy ICONIP (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF machine learning, feature extraction, IDS
25Mahboobeh Soleimani, Ehsan Khosrowshahi Asl, Mina Doroud, Morteza Damanafshan, Akbar Behzadi, Maghsoud Abbaspour RAAS: a reliable analyzer and archiver for snort intrusion detection system. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IDS analyzer, intrusion detection system, archiving, snort
25Xin Jin, Sylvia L. Osborn Architecture for Data Collection in Database Intrusion Detection Systems. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF database IDS, intrusion detection, database security
25Jonathon T. Giffin, Somesh Jha, Barton P. Miller Automated Discovery of Mimicry Attacks. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IDS evaluation, model-based anomaly detection, model checking, attacks
25Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt A Specification-Based Intrusion Detection Model for OLSR. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Specification based IDS, MANET, Mobile ad hoc network, Intrusion Detection, Network Security, Constraints, OLSR
24Javier G. Marín-Blázquez, Gregorio Martínez Pérez Intrusion detection using a linguistic hedged fuzzy-XCS classifier system. Search on Bibsonomy Soft Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Florian Mansmann, Fabian Fischer 0001, Daniel A. Keim, Stephen C. North Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations. Search on Bibsonomy CHIMIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin Database Intrusion Detection Using Role Profiling with Role Hierarchy. Search on Bibsonomy Secure Data Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Role profiling, Intrusion detection, RBAC, Database security, Insider threats
24Frédéric Massicotte Packet Space Analysis of Intrusion Detection Signatures. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Urko Zurutuza, Roberto Uribeetxeberria, Diego Zamboni A data mining approach for analysis of worm activity through automatic signature generation. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF automatic signature generation, malware identification, data mining, intrusion detection, honeypots
24Chetan Parampalli, R. Sekar 0001, Rob Johnson A practical mimicry attack against powerful system-call monitors. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack
24Khalid Alsubhi, Ehab Al-Shaer, Raouf Boutaba Alert prioritization in Intrusion Detection Systems. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Yifeng Zeng, Prashant Doshi An Information-Theoretic Approach to Model Identification in Interactive Influence Diagrams. Search on Bibsonomy IAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Zhuo Ning, Jian Gong A Sampling Method for Intrusion Detection System. Search on Bibsonomy APNOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multistage bloom filter, feature entropy, sampling, Intrusion detection system
24Yang Liu, Fengqi Yu Immunity-based intrusion detection for wireless sensor networks. Search on Bibsonomy IJCNN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Robert J. Cole, Peng Liu Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Zhenwei Yu 0001, Jeffrey J. P. Tsai, Thomas J. Weigert An Automatically Tuning Intrusion Detection System. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Mei-Ling Shyu, Thiago Quirino, Zongxing Xie, Shu-Ching Chen, LiWu Chang Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems. Search on Bibsonomy ACM Trans. Auton. Adapt. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF adaptive sub-eigenspace modeling (ASEM), agent-based distributed system, intrusion detection, network security, Agent communications
24Damianos Gavalas, Grammati E. Pantziou, Charalampos Konstantopoulos, Basilis Mamalis LIDAR: a protocol for stable and energy-efficient clustering of ad-hoc multihop networks. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Clustering, Algorithm, Mobile ad hoc networks, Energy efficiency, Stability
24Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte Defining categories to select representative attack test-cases. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF classification, evaluation, test, intrusion detection systems, attack
Displaying result #401 - #500 of 2223 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license