The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Intruder with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1995 (16) 1996-1999 (15) 2000 (16) 2001-2002 (39) 2003 (35) 2004 (40) 2005 (47) 2006 (51) 2007 (59) 2008 (66) 2009 (43) 2010 (18) 2011-2012 (28) 2013-2014 (27) 2015 (15) 2016-2017 (29) 2018-2019 (18) 2020 (15) 2021 (18) 2022 (15) 2023 (16) 2024 (3)
Publication types (Num. hits)
article(160) book(1) incollection(1) inproceedings(464) phdthesis(3)
Venues (Conferences, Journals, ...)
CoRR(29) ACC(7) CSFW(7) ESORICS(7) RTA(7) CDC(6) EUROCRYPT(6) ARES(5) Formal Aspects in Security and...(5) ICC(5) SMC(5) ACSAC(4) ICCSA (1)(4) ICRA(4) Int. J. Inf. Sec.(4) IROS(4) More (+10 of total 415)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 387 occurrences of 262 keywords

Results
Found 629 publication records. Showing 629 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Ioannis Krontiris, Zinaida Benenson, Thanassis Giannetsos, Felix C. Freiling, Tassos Dimitriou Cooperative Intrusion Detection in Wireless Sensor Networks. Search on Bibsonomy EWSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, sensor networks, intrusion detection
10Tugkan Tuglular, Can Arda Muftuoglu, Özgür Kaya, Fevzi Belli, Michael Linschulte GUI-Based Testing of Boundary Overflow Vulnerability. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10James P. Delgrande, Torsten Grote, Aaron Hunter 0001 A General Approach to the Verification of Cryptographic Protocols Using Answer Set Programming. Search on Bibsonomy LPNMR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Qi Wang, Shu Wang, Zhonglou Meng Applying an Intrusion Detection Algorithm to Wireless Sensor Networks. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Vasily Desnitsky, Igor V. Kotenko Design of Entrusting Protocols for Software Protection. Search on Bibsonomy IF&GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security protocol design, Remote entrusting, Protocol analysis and verification, Attacks, Software protection
10Jaroslaw Skaruz, Franciszek Seredynski Web Application Security through Gene Expression Programming. Search on Bibsonomy EvoWorkshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Intrusion detection, SQL, GEP
10Ghassan Ahmed Ali, Aman Jantan, Abdulghani Ali Honeybee-Based Model to Detect Intrusion. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF honeybee, intrusion detection, network security, natural computing
10Wazen M. Shbair, Ahmed R. Bashandy, Samir I. Shaheen A New Security Mechanism to Perform Traffic Anonymity with Dummy Traffic Synthesis. Search on Bibsonomy CSE (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Reiner Dojen, Vladimir Pasca, Tom Coffey Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mobile end-to-end communication, analysis of security protocols, authentication and secrecy protocol, impersonation attack
10Sergiu Bursuc, Hubert Comon-Lundh Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions. Search on Bibsonomy RTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Khaled Alghathbar, Hanan A. Mahmoud Noisy password scheme: A new one time password system. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Youssef Hanna, Hridesh Rajan Slede: Framework for automatic verification of sensor network security protocol implementations. Search on Bibsonomy ICSE Companion The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Amit Kumar Choudhary, Akhilesh Swarup Neural network approach for intrusion detection. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF neural network, intrusion detection system, generalized regression neural network
10Sibylle B. Fröschle, Graham Steel Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data. Search on Bibsonomy ARSPA-WITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Yun Wang 0001, Xiaodong Wang 0009, Bin Xie 0001, Demin Wang, Dharma P. Agrawal Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Probability and Statistics, Wireless sensor networks, Pervasive computing, Security and Privacy Protection, Network Architecture and Design
10Oliver Kosut, Lang Tong Distributed Source Coding in the Presence of Byzantine Sensors. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Vikram Krishnamurthy, Michael Maskery, Gang George Yin Decentralized Adaptive Filtering Algorithms for Sensor Activation in an Unattended Ground Sensor Network. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Plamen P. Angelov, Xiaowei Zhou Evolving Fuzzy-Rule-Based Classifiers From Data Streams. Search on Bibsonomy IEEE Trans. Fuzzy Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Jin Wei, Guiping Su, Meng Xu An Integrated Model to Analyze Cryptographic Protocols with Colored Petri Nets. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Ralf Küsters, Tomasz Truderung Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security protocols, algebraic properties
10Foteini Agrafioti, Dimitrios Hatzinakos ECG Based Recognition Using Second Order Statistics. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF biometrics, Electrocardiogram, discriminant analysis, autocorrelation, cosine transform
10Matthew Johnson 0001, Paul J. Feltovich, Jeffrey M. Bradshaw, Larry Bunch Human-robot coordination through dynamic regulation. Search on Bibsonomy ICRA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Srivatsava Ranjit Ganta, Raj Acharya On breaching enterprise data privacy through adversarial information fusion. Search on Bibsonomy ICDE Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Jeremie Leguay, Mario Lopez-Ramos, Kathlyn Jean-Marie, Vania Conan Service oriented architecture for heterogeneous and dynamic sensor networks. Search on Bibsonomy DEBS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF wireless sensor networks, service oriented architectures
10Srivatsava Ranjit Ganta, Raj Acharya Adaptive data anonymization against information fusion based privacy attacks on enterprise data. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Amin Hassanzadeh, Babak Sadeghian Intrusion Detection with Data Correlation Relation Graph. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF correlation relation graph, synflood, regression line, intrusion detection, correlation coefficient, data correlation
10Abdelraouf Ouadjaout, Yacine Challal, Noureddine Lasla, Miloud Bagaa SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Wireless sensor networks, Fault tolerance, Intrusion tolerance, Secure routing
10Jordi Pont-Tuset, Jordi Nin, Pau Medrano-Gracia, Josep Lluís Larriba-Pey, Victor Muntés-Mulero Improving Microaggregation for Complex Record Anonymization. Search on Bibsonomy MDAI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy in Statistical Databases, k-anonymity, Microaggregation
10Adriano Fagiolini, Elena Maria Visibelli, Antonio Bicchi Logical consensus for distributed network agreement. Search on Bibsonomy CDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Anooshiravan Saboori, Christoforos N. Hadjicostis Opacity-enforcing supervisory strategies for secure discrete event systems. Search on Bibsonomy CDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Roxana Burghelea, Jean Philippe Mangeot, Frédéric Launay, Patrick Coirault, Safwan El Assad Coherent Synchronization of a Chaotic Communication System Based on a QAM-4 Transmitter. Search on Bibsonomy ICISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Ronald Toegl, Georg Hofferek, Karin Greimel, Adrian Leung, Raphael Chung-Wei Phan, Roderick Bloem Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Habib M. Ammari, Sajal K. Das 0001 Clustering-Based Minimum Energy Wireless m -Connected k -Covered Sensor Networks. Search on Bibsonomy EWSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Clustering, Connectivity, Coverage, WSNs, Duty-cycling
10Volkan Ustun, Jeffrey S. Smith Mental simulation for creating realistic behavior in physical security systems simulation. Search on Bibsonomy WSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Junsup Lee, Sung Deok Cha Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Ton van Deursen, Sjouke Mauw, Sasa Radomirovic Untraceability of RFID Protocols. Search on Bibsonomy WISTP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RFID protocols, formal verification, untraceability
10Naya Nagy, Marius Nagy, Selim G. Akl Quantum Wireless Sensor Networks. Search on Bibsonomy UC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF quantum teleportation, entanglement swapping, wireless sensor networks, quantum cryptography
10Ying-Wei Kuo, Shou-Hsuan Stephen Huang An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets. Search on Bibsonomy ICPADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Jianhua Yang, Byong Lee Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Francesco Amigoni, Nicola Gatti 0001, Antonio Ippedico A Game-Theoretic Approach to Determining Efficient Patrolling Strategies for Mobile Robots. Search on Bibsonomy IAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Anongporn Salaiwarakul, Mark Ryan 0001 Analysis of a Biometric Authentication Protocol for Signature Creation Application. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10M. Vipin, A. V. Sarad, Sankar Kuppan A Multi Way Tree for Token Based Authentication. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Tobias Hanning, Aless Lasaruk MIDIAS: An Integrated 2D/3D Sensor System for Safety Applications. Search on Bibsonomy ACIVS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Wei Wang 0062, Dongyao Ji Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. Search on Bibsonomy FORTE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AACS, Authenticity, SPIN, LTL, Collusion Attack, Model Checker
10Jordi Nin, Javier Herranz, Vicenç Torra Towards a More Realistic Disclosure Risk Assessment. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Chris Skinner Assessing Disclosure Risk for Record Linkage. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2008 DBLP  DOI  BibTeX  RDF misclassification, match, identification, uniqueness, log-linear model
10Gabriele Lenzini, Fabio Martinelli, Ilaria Matteucci, Stefania Gnesi A Uniform Approach to Security and Fault-Tolerance Specification and Analysis. Search on Bibsonomy WADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Software Architecture Formal Analysis, Security, Fault Tolerance
10Emmanuel Velasco, Weifeng Chen 0001, Ping Ji 0002, Raymond Hsieh Wireless Forensic: A New Radio Frequency Based Locating System. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Ajith Abraham Real time intrusion prediction, detection and prevention programs. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Matthew Johnson 0001, Paul J. Feltovich, Jeffrey M. Bradshaw, Larry Bunch Demonstrating Human-Robot Coordination through Dynamic Regulation. Search on Bibsonomy POLICY The full citation details ... 2008 DBLP  DOI  BibTeX  RDF policy, domain, demo
10Matthew Johnson 0001, Jeffrey M. Bradshaw, Hyuckchul Jung, Niranjan Suri, Marco M. Carvalho Policy Management across Multiple Platforms and Application Domains. Search on Bibsonomy POLICY The full citation details ... 2008 DBLP  DOI  BibTeX  RDF policy, domain
10Boting Yang, Yi Cao On the Monotonicity of Weak Searching. Search on Bibsonomy COCOON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Jeremie Leguay, Mario Lopez-Ramos, Kathlyn Jean-Marie, Vania Conan An efficient service oriented architecture for heterogeneous and dynamic wireless sensor networks. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Rob Delicata, Steve A. Schneider An algebraic approach to the verification of a class of Diffie-Hellman protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Protocol verification, Diffie-Hellman
10Ramana Rao Kompella, Sumeet Singh, George Varghese On scalable attack detection in the network. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF data structures, denial of service, routers, scanning, streaming algorithms, network attacks, syn flooding
10Jianjun Chen, Zoltan Safar, John Aasted Sørensen Multimodal Wireless Networks: Communication and Surveillance on the Same Infrastructure. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Sartid Vongpradhip, Wichet Plaimart Survival Architecture for Distributed Intrusion Detection System (dIDS) using Mobile Agent. Search on Bibsonomy NCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mobile agent, Network security, Distributed denial-of-service, Security architecture, security engineering, Distributed intrusion detection systems
10Klaas Ole Kürtz, Ralf Küsters, Thomas Wilke Selecting theories and nonce generation for recursive protocols. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security protocols, decidability, automatic analysis
10Anh-Quynh Nguyen, Yoshiyasu Takefuji A novel approach for a file-system integrity monitor tool of Xen virtual machine. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Xen virtual machine, intrusion detection, Linux, rootkit
10Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch Verifying Cryptographic Protocols with Subterms Constraints. Search on Bibsonomy LPAR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Kjetil Haslum, Ajith Abraham, Svein J. Knapskog DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Jan Magott, Pawel Skrobanek, Marek Woda Analysis of Timing Requirements for Intrusion Detection System. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Alessandro Armando, Roberto Carbone, Luca Compagna LTL Model Checking for Security Protocols. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Detlef Kähler, Ralf Küsters, Tomasz Truderung Infinite State AMC-Model Checking for Cryptographic Protocols. Search on Bibsonomy LICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Geethapriya Venkataramani, Srividya Gopalan Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill, Jim Basney, Yuliyan Kiryakov, John C. Knight, Anh Nguyen-Tuong, Andrew S. Grimshaw, Marty Humphrey Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections. Search on Bibsonomy HPCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Sergiu Bursuc, Hubert Comon-Lundh, Stéphanie Delaune Deducibility Constraints, Equational Theory and Electronic Money. Search on Bibsonomy Rewriting, Computation and Proof The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Pau Medrano-Gracia, Jordi Pont-Tuset, Jordi Nin, Victor Muntés-Mulero Ordered Data Set Vectorization for Linear Regression on Data Privacy. Search on Bibsonomy MDAI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Privacy in statistical databases, Statistical disclosure risk, Linear regression masking methods, Privacy preserving data mining
10Grant Cermak, Karl Keyzer Unsupervised Intrusion Detection Using Color Images. Search on Bibsonomy ISVC (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Moustafa Youssef 0001, Matthew Mah, Ashok K. Agrawala Challenges: device-free passive localization for wireless environments. Search on Bibsonomy MobiCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF device-free localization, passive localization, passive radio map
10Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng 0001 An OS Security Protection Model for Defeating Attacks from Network. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Access Control, information flow
10Frédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard, Julien A. Thomas Misbehaviors Detection to Ensure Availability in OLSR. Search on Bibsonomy MSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Routing, Mobile Ad Hoc Network, Intrusion Detection, Availability, OLSR
10Tim J. Grant 0001, H. S. Venter, Jan H. P. Eloff Simulating adversarial interactions between intruders and system administrators using OODA-RR. Search on Bibsonomy SAICSIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF OODA, process model, adversary
10Gizela Jakubowska, Wojciech Penczek Is Your Security Protocol on Time ? Search on Bibsonomy FSEN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Eun-Jun Yoon, Kee-Young Yoo Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public key substitution attack, Cryptanalysis, Non-repudiation, Key authentication
10Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, Marios Mpasoukos Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. Search on Bibsonomy ALGOSENSORS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Primoz Skraba, Leonidas J. Guibas Energy Efficient Intrusion Detection in Camera Sensor Networks. Search on Bibsonomy DCOSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Rituparna Chaki, Nabendu Chaki IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. Search on Bibsonomy CISIM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Compromise node, Internal intrusion, Phantom intrusion detection, Mobile ad hoc network, IDS
10Alessio Dore, Matteo Pinasco, Carlo S. Regazzoni A Bio-inspired Learning Approach for the Classification of Risk Zones in a Smart Space. Search on Bibsonomy CVPR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Zhen Cao, Zhi Guan, Zhong Chen 0001, Jian-bin Hu, Liyong Tang An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction. Search on Bibsonomy FSKD (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Brian Alspach, Danny Dyer, Denis Hanson, Boting Yang Arc Searching Digraphs Without Jumping. Search on Bibsonomy COCOA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Boting Yang, Runtao Zhang, Yi Cao Searching Cycle-Disjoint Graphs. Search on Bibsonomy COCOA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Vivek K. Singh 0001, Pradeep K. Atrey, Mohan S. Kankanhalli Coopetitive Multimedia Surveillance. Search on Bibsonomy MMM (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Cristina L. Abad, Rafael Bonilla An Analysis on the Schemes for Detecting and Preventing ARP Cache Poisoning Attacks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Mingfei Wang, Linlin Ci, Ping Zhan, Yongjun Xu Acoustic Source Localization in Wireless Sensor Networks. Search on Bibsonomy IITA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Hyun-A Park, Dong Hoon Lee 0001, Jongin Lim 0001, Sang Hyun Cho PPIDS: Privacy Preserving Intrusion Detection System. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Host-based IDS, Privacy, Intrusion Detection System, Audit log, Privacy Homomorphism
10David Argles, Alex Pease, Robert John Walters An Improved Approach to Secure Authentication and Signing. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Adrian P. Lauf, Richard A. Peters, William H. Robinson Embedded Intelligent Intrusion Detection: A Behavior-Based Approach. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Han-Ching Wu, Shou-Hsuan Stephen Huang Detecting Stepping-Stone with Chaff Perturbations. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Stepping-stone Detection, Chaff Perturbation, Intrusion Detection, Random Walk, Traceback
10Neerja Bhatnagar, Ethan L. Miller Designing a secure reliable file system for sensor networks. Search on Bibsonomy StorageSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sensor network file system, secure, reliable
10Ashwin Swaminathan, Yinian Mao, Guan-Ming Su, Hongmei Gou, Avinash L. Varna, Shan He 0002, Min Wu 0001, Douglas W. Oard Confidentiality-preserving rank-ordered search. Search on Bibsonomy StorageSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encrypted domain search, secure index, ranked retrieval
10Doran Chakraborty, Sandip Sen Distributed intrusion detection in partially observable Markov decision processes. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF fault tolerance, multiagent planning
10Hans Hüttel, Jirí Srba Decidability Issues for Extended Ping-Pong Protocols. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF replication, cryptographic protocols, formal modelling, recursion
10Tom Chothia, Simona Orzan, Jun Pang 0001, Muhammad Torabi Dashti A Framework for Automatically Checking Anonymity with mu CRL. Search on Bibsonomy TGC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Ashish Gehani, Surendar Chandra, Gershon Kedem Augmenting storage with an intrusion response primitive to ensure the security of critical data. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10John Z. Zhang, Tsunehiko Kameda Where to Build a Door. Search on Bibsonomy IROS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Iman Marvian, Saied Hosseini-Khayat Secure Data Transmission Using Qubits. Search on Bibsonomy CIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jin Wook Lee, Yann-Hang Lee ITB: Intrusion-Tolerant Broadcast Protocol in Wireless Sensor Networks. Search on Bibsonomy HPCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Gürhan Küçük, Can Basaran Power-Aware Processors for Wireless Sensor Networks. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 629 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license