|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1161 occurrences of 620 keywords
|
|
|
Results
Found 2227 publication records. Showing 2223 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
33 | Iksen Caglar, Deniz Turgay Altilar |
An Energy Efficient VM Allocation Approach for Data Centers. |
BigDataSecurity/HPSC/IDS |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Anku Adhikari, Avesta Hojjati, Juanli Shen, Jui-Ting Hsu, William P. King, Marianne Winslett |
Trust Issues for Big Data about High-Value Manufactured Parts. |
BigDataSecurity/HPSC/IDS |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Keke Gai, Meikang Qiu, Sam Adam Elnagdy |
Security-Aware Information Classifications Using Supervised Learning for Cloud-Based Cyber Risk Management in Financial Big Data. |
BigDataSecurity/HPSC/IDS |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Li Ma, Lixin Tao, Yong Zhong, Keke Gai |
RuleSN: Research and Application of Social Network Access Control Model. |
BigDataSecurity/HPSC/IDS |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Veena Reddy Reguri, Swetha Kogatam, Melody Moh |
Energy Efficient Traffic-Aware Virtual Machine Migration in Green Cloud Data Centers. |
BigDataSecurity/HPSC/IDS |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Baijian Yang 0001, Tonglin Zhang |
A Scalable Meta-Model for Big Data Security Analyses. |
BigDataSecurity/HPSC/IDS |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Hua Yin, Keke Gai, Zhijian Wang |
A Classification Algorithm Based on Ensemble Feature Selections for Imbalanced-Class Dataset. |
BigDataSecurity/HPSC/IDS |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Wael Hosny Fouad Aly |
Adaptive Combinatorial Key Scheme for Mobile Heterogeneous Wireless Sensor Networks. |
BigDataSecurity/HPSC/IDS |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Vicky Na Zhao, Melody Moh, Teng-Sheng Moh |
Contextual-Aware Hybrid Recommender System for Mixed Cold-Start Problems in Privacy Protection. |
BigDataSecurity/HPSC/IDS |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Kutub Thakur, Md Liakat Ali, Keke Gai, Meikang Qiu |
Information Security Policy for E-Commerce in Saudi Arabia. |
BigDataSecurity/HPSC/IDS |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Natalia Stakhanova, Ali A. Ghorbani 0001 |
Managing intrusion detection rule sets. |
EUROSEC |
2010 |
DBLP DOI BibTeX RDF |
detection rules, intrusion detection signatures |
32 | Steffen Reidt, Mudhakar Srivatsa, Shane Balfe |
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
bees, partially available, suicide, trust authority, game, incentive, revocation, reward |
32 | Vadim D. Kotov, Vladimir I. Vasilyev |
Artificial immune system based intrusion detection system. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
negative selection algorithms, artificial immune system, intrusion detection system, system calls |
32 | Julien Gaugaz, Jakub Zakrzewski 0002, Gianluca Demartini, Wolfgang Nejdl |
How to Trace and Revise Identities. |
ESWC |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Christie I. Ezeife, Dan Zhang |
TidFP: Mining Frequent Patterns in Different Databases with Transaction ID. |
DaWaK |
2009 |
DBLP DOI BibTeX RDF |
Transaction id, Distributed Mining, Multiple Table Mining, Data mining, Frequent Patterns |
32 | Elvis Pontes, Adilson Eduardo Guelfi |
IFS - Intrusion forecasting system based on collaborative architecture. |
ICDIM |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Ioannis Sourdis, João Bispo, João M. P. Cardoso, Stamatis Vassiliadis |
Regular Expression Matching in Reconfigurable Hardware. |
J. Signal Process. Syst. |
2008 |
DBLP DOI BibTeX RDF |
network security, pattern matching, regular expression, reconfigurable hardware |
32 | Huijuan Lu, Jianguo Chen, Wei Wei |
Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection, Bayesian networks, Anomaly detection |
32 | Zhan Jiuhua |
Intrusion Detection System Based on Data Mining. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Navneet Kumar Pandey, S. K. Gupta 0001, Shaveta Leekha |
Algebra for Capability Based Attack Correlation. |
WISTP |
2008 |
DBLP DOI BibTeX RDF |
capability model, intrusion detection, attack scenario |
32 | Chunfu Jia, Deqiang Chen, Kai Lin |
The Application of the Relative Entropy Density Divergence in Intrusion Detection Models. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Frédéric Massicotte, Yvan Labiche, Lionel C. Briand |
Toward Automatic Generation of Intrusion Detection Verification Rules. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke |
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. |
TrustBus |
2008 |
DBLP DOI BibTeX RDF |
True positive, DARPA dataset, Intrusion Detection System, False positive, Snort |
32 | Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bhattacharya |
Testing Intrusion Detection Systems in MANET: A Comprehensive Study. |
CNSR |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Meriam Ben Ghorbel, Mehdi Talbi, Mohamed Mejri |
Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira, Yongjin Kwon |
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts. |
ASIAN |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Jérôme Hugues, Bechir Zalila, Laurent Pautet, Fabrice Kordon |
Rapid Prototyping of Distributed Real-Time Embedded Systems Using the AADL and Ocarina. |
IEEE International Workshop on Rapid System Prototyping |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Fabrice Kordon, Jean-Baptiste Voron |
Rapid Prototyping of Intrusion Detection Systems. |
IEEE International Workshop on Rapid System Prototyping |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Anders Hansson, Gabriel Istrate, Shiva Prasad Kasiviswanathan |
Combinatorics of TCP reordering. |
J. Comb. Optim. |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Zhiyong Liu 0001, Hong Qiao |
Hidden Markov Model Based Intrusion Detection. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Artem Vorobiev, Jun Han 0004 |
Security Attack Ontology for Web Services. |
SKG |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Il-Yong Kim, Yoo-Sung Kim, Ki-Chang Kim |
Zone-Based Clustering for Intrusion Detection Architecture in Ad-Hoc Networks. |
APNOMS |
2006 |
DBLP DOI BibTeX RDF |
Intrusion detection architecture, Clustering, Ad-hoc Network |
32 | A. H. M. Rezaul Karim, R. M. A. P. Rajatheva, Kazi M. Ahmed |
An efficient collaborative intrusion detection system for MANET using Bayesian Approach. |
MSWiM |
2006 |
DBLP DOI BibTeX RDF |
MANET, intrusion detection system, Bayesian approach |
32 | Alvaro A. Cárdenas, John S. Baras, Karl Seamon |
A Framework for the Evaluation of Intrusion Detection Systems. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim 0001 |
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Pradeep Kannadiga, Mohammad Zulkernine |
DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. |
SNPD |
2005 |
DBLP DOI BibTeX RDF |
network security and distributed systems, mobile agents, Intrusion detection, distributed attacks |
32 | Se-Yul Lee, Yong-Soo Kim, Woongjae Lee |
A Hybrid Network Model for Intrusion Detection Based on Session Patterns and Rate of False Errors. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Dong Seong Kim 0001, Ha-Nam Nguyen, Jong Sou Park |
Genetic Algorithm to Improve SVM Based Network Intrusion Detection System. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov, Alexander Ulanov |
Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Wing W. Y. Ng, Aki P. F. Chan, Daniel S. Yeung, Eric C. C. Tsang |
Construction of High Precision RBFNN with Low False Alarm for Detecting Flooding Based Denial of Service Attacks Using Stochastic Sensitivity Measure. |
ICMLC |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Fernando Godínez, Dieter Hutter, Raúl Monroy |
Service Discrimination and Audit File Reduction for Effective Intrusion Detection. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
Object Reduction, Intrusion Detection, Dimensionality Reduction, Misuse Detection |
32 | Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong Han |
SCIDS: A Soft Computing Intrusion Detection System. |
IWDC |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Dong Seong Kim 0001, Jong Sou Park |
Network-Based Intrusion Detection with Support Vector Machines. |
ICOIN |
2003 |
DBLP DOI BibTeX RDF |
|
32 | David A. Wagner 0001, Paolo Soto |
Mimicry attacks on host-based intrusion detection systems. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
anomaly detection, host-based intrusion detection, evasion attacks |
32 | Xinzhou Qin, Wenke Lee, Lundy M. Lewis, João B. D. Cabrera |
Integrating intrusion detection and network management. |
NOMS |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Kulsoom Abdullah, John A. Copeland |
Tool update: high alarm count issues in IDS rainstorm. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
IDS alarm visualization, filtering network data, network security information visualization |
31 | Safaa O. Al-Mamory, Hongli Zhang 0001 |
IDS alerts correlation using grammar-based approach. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Quan Qian, Rui Zhang 0013, Hongyi Che |
Object-oriented Case Representation and Its Application in IDS. |
ACIS-ICIS |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Álvaro Herrero 0001, Emilio Corchado |
Traffic Data Preparation for a Hybrid Network IDS. |
HAIS |
2008 |
DBLP DOI BibTeX RDF |
Hybrid Artificial Intelligence Systems, Artificial Intelligence, Artificial Neural Networks, Unsupervised Learning, Network Intrusion Detection, Computer Network Security, Projection Methods |
31 | Jorge Belenguer, Carlos Miguel Tavares Calafate |
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Arnur G. Tokhtabayev, Victor A. Skormin |
Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
Anomaly Propagation, Intrusion detection, Markov Models |
31 | Rafael Páez, Cristina Satizábal, Jordi Forné |
A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Ilija Basicevic, Miroslav Popovic, Vladimir Kovacevic |
Use of Publisher-Subscriber Design Pattern in Infrastructure of Distributed IDS Systems. |
ICNS |
2007 |
DBLP DOI BibTeX RDF |
|
31 | David Duncombe, George M. Mohay, Andrew J. Clark |
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. |
ACSW |
2006 |
DBLP BibTeX RDF |
immunological., intrusion detection, alert correlation |
31 | Youngok Jeong, Younggoo Han, Hyunwoo Kim, Woochul Shim, Jaehong Kim, Sehun Kim |
Cost-Effective IDS Operating Scheme in MANETs. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Mathieu Blanc, Jérémy Briffaut, Jean-François Lalande, Christian Toinard |
Distributed Control Enabling Consistent MAC Policies and IDS Based on a Meta-Policy Approach. |
POLICY |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Emmanuel Hooper |
Intelligent Autonomic Strategy to Attacks in Network Infrastructure Protection: Feedback Methods to IDS, Using Policies, Alert Filters and Firewall Packet Filters for Multiple Protocols. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Hilmi A. Lahoud, Xin Tang |
Information security labs in IDS/IPS for distance education. |
SIGITE Conference |
2006 |
DBLP DOI BibTeX RDF |
online labs, distance learning, remote labs |
31 | Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li 0001 |
New Method for Intrusion Features Mining in IDS. |
ICIC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Feng Zhao, Qing-Hua Li, Yan-Bin Zhao |
Real Time Approaches for Time-Series Mining-Based IDS. |
GCC |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Uwe Aickelin, Peter J. Bentley, Steve Cayzer, Jungwon Kim, Julie McLeod |
Danger Theory: The Link between AIS and IDS? |
ICARIS |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Ricardo Staciarini Puttini, Jean-Marc Percher, Ludovic Mé, Olivier Camp, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, L. Javier García-Villalba |
A Modular Architecture for Distributed IDS in MANET. |
ICCSA (3) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Shahriar Najand, Douglas M. Blough, Glenn Healey |
Signal-to-Noise Ratio in the Reconstruction of the Intensity Dependent Spread (IDS) Filter. |
ICIP (1) |
1997 |
DBLP DOI BibTeX RDF |
|
29 | Sura Emanet, Gozde Karatas Baydogmus, Önder Demir |
An ensemble learning based IDS using Voting rule: VEL-IDS. |
PeerJ Comput. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Yunfan Huang, Maode Ma |
ILL-IDS: An incremental lifetime learning IDS for VANETs. |
Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Mahawish Fatima, Osama Rehman, Ibrahim M. H. Rehman |
Li-IDS: An Approach Towards a Lightweight IDS for Resource-Constrained IoT. |
SmartNets |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Farhad Mofidi, Sena Hounsinou, Gedare Bloom |
L-IDS: A lightweight hardware-assisted IDS for IoT systems to detect ransomware attacks. |
IoTDI |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Komal Singh Gill, Sharad Saxena, Anju Sharma |
GTA-IDS: Game Theoretic Approach to Enhance IDS Detection in Cloud Environment. |
Comput. Informatics |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Aliya Tabassum, Aiman Erbad, Wadha Lebda, Amr Mohamed 0001, Mohsen Guizani |
FEDGAN-IDS: Privacy-preserving IDS using GAN and Federated Learning. |
Comput. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Junwei Liang 0004, Maode Ma, Xu Tan |
GaDQN-IDS: A Novel Self-Adaptive IDS for VANETs Based on Bayesian Game Theory and Deep Reinforcement Learning. |
IEEE Trans. Intell. Transp. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Lisa Liu, Gints Engelen, Timothy M. Lynar, Daryl Essam, Wouter Joosen |
Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018. |
CNS |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Yazan Otoum, Amiya Nayak |
AS-IDS: Anomaly and Signature Based IDS for the Internet of Things. |
J. Netw. Syst. Manag. |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Marta Catillo, Andrea Del Vecchio, Luciano Ocone, Antonio Pecchia, Umberto Villano |
USB-IDS-1: a Public Multilayer Dataset of Labeled Network Flows for IDS Evaluation. |
DSN Workshops |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Navya Iyengar |
Evaluation of Network Based IDS and Deployment of multi-sensor IDS. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
29 | Subiksha Srinivasa Gopalan, Dharshini Ravikumar, Dino Linekar, Ali Raza, Maheen Hasib |
Balancing Approaches towards ML for IDS: A Survey for the CSE-CIC IDS Dataset. |
ICCSPA |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Felix Erlacher, Falko Dressler |
Testing IDS using GENESIDS: Realistic Mixed Traffic Generation for IDS Evaluation. |
SIGCOMM Posters and Demos |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Rainer Bye |
Group-based IDS Collaboration Framework (A Case Study of the Artificial Immune System) (Gruppenbasiertes IDS Kollaborationsrahmenwerk) (eine Fallstudie über das Künstliche Immunsystem) |
|
2013 |
RDF |
|
29 | Karim Tabia, Philippe Leray 0001 |
Handling IDS' Reliability in Alert Correlation - A Bayesian Network-based Model for Handling IDS's Reliability and Controlling Prediction/False Alarm Rate Tradeoffs. |
SECRYPT |
2010 |
DBLP BibTeX RDF |
|
26 | Rahul Khanna, Huaping Liu |
Distributed and control theoretic approach to intrusion detection. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
hidden markov models, intrusion detection, wireless ad-hoc networks, IDS |
26 | Rahul Khanna, Huaping Liu |
System approach to intrusion detection using hidden Markov model. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
hidden Markov models, wireless ad hoc networks, IDS |
26 | Byung-Joo Kim, Il Kon Kim |
Improved Realtime Intrusion Detection System. |
ICONIP (3) |
2006 |
DBLP DOI BibTeX RDF |
machine learning, feature extraction, IDS |
25 | Mahboobeh Soleimani, Ehsan Khosrowshahi Asl, Mina Doroud, Morteza Damanafshan, Akbar Behzadi, Maghsoud Abbaspour |
RAAS: a reliable analyzer and archiver for snort intrusion detection system. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
IDS analyzer, intrusion detection system, archiving, snort |
25 | Xin Jin, Sylvia L. Osborn |
Architecture for Data Collection in Database Intrusion Detection Systems. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
database IDS, intrusion detection, database security |
25 | Jonathon T. Giffin, Somesh Jha, Barton P. Miller |
Automated Discovery of Mimicry Attacks. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
IDS evaluation, model-based anomaly detection, model checking, attacks |
25 | Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt |
A Specification-Based Intrusion Detection Model for OLSR. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
Specification based IDS, MANET, Mobile ad hoc network, Intrusion Detection, Network Security, Constraints, OLSR |
24 | Javier G. Marín-Blázquez, Gregorio Martínez Pérez |
Intrusion detection using a linguistic hedged fuzzy-XCS classifier system. |
Soft Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Florian Mansmann, Fabian Fischer 0001, Daniel A. Keim, Stephen C. North |
Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations. |
CHIMIT |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin |
Database Intrusion Detection Using Role Profiling with Role Hierarchy. |
Secure Data Management |
2009 |
DBLP DOI BibTeX RDF |
Role profiling, Intrusion detection, RBAC, Database security, Insider threats |
24 | Frédéric Massicotte |
Packet Space Analysis of Intrusion Detection Signatures. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Urko Zurutuza, Roberto Uribeetxeberria, Diego Zamboni |
A data mining approach for analysis of worm activity through automatic signature generation. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
automatic signature generation, malware identification, data mining, intrusion detection, honeypots |
24 | Chetan Parampalli, R. Sekar 0001, Rob Johnson |
A practical mimicry attack against powerful system-call monitors. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack |
24 | Khalid Alsubhi, Ehab Al-Shaer, Raouf Boutaba |
Alert prioritization in Intrusion Detection Systems. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Yifeng Zeng, Prashant Doshi |
An Information-Theoretic Approach to Model Identification in Interactive Influence Diagrams. |
IAT |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Zhuo Ning, Jian Gong |
A Sampling Method for Intrusion Detection System. |
APNOMS |
2008 |
DBLP DOI BibTeX RDF |
multistage bloom filter, feature entropy, sampling, Intrusion detection system |
24 | Yang Liu, Fengqi Yu |
Immunity-based intrusion detection for wireless sensor networks. |
IJCNN |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Robert J. Cole, Peng Liu |
Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Zhenwei Yu 0001, Jeffrey J. P. Tsai, Thomas J. Weigert |
An Automatically Tuning Intrusion Detection System. |
IEEE Trans. Syst. Man Cybern. Part B |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Mei-Ling Shyu, Thiago Quirino, Zongxing Xie, Shu-Ching Chen, LiWu Chang |
Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems. |
ACM Trans. Auton. Adapt. Syst. |
2007 |
DBLP DOI BibTeX RDF |
adaptive sub-eigenspace modeling (ASEM), agent-based distributed system, intrusion detection, network security, Agent communications |
24 | Damianos Gavalas, Grammati E. Pantziou, Charalampos Konstantopoulos, Basilis Mamalis |
LIDAR: a protocol for stable and energy-efficient clustering of ad-hoc multihop networks. |
Telecommun. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Clustering, Algorithm, Mobile ad hoc networks, Energy efficiency, Stability |
24 | Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte |
Defining categories to select representative attack test-cases. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
classification, evaluation, test, intrusion detection systems, attack |
Displaying result #401 - #500 of 2223 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|