The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for intrusion with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1991 (15) 1992-1994 (22) 1995-1996 (19) 1997 (21) 1998 (21) 1999 (101) 2000 (82) 2001 (116) 2002 (179) 2003 (304) 2004 (453) 2005 (612) 2006 (626) 2007 (603) 2008 (674) 2009 (552) 2010 (420) 2011 (377) 2012 (338) 2013 (307) 2014 (319) 2015 (323) 2016 (370) 2017 (441) 2018 (595) 2019 (702) 2020 (790) 2021 (953) 2022 (1105) 2023 (1303) 2024 (309)
Publication types (Num. hits)
article(5186) book(16) data(15) incollection(79) inproceedings(7542) phdthesis(194) proceedings(20)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3828 occurrences of 1280 keywords

Results
Found 13052 publication records. Showing 13052 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
30Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou Integrated Access Control and Intrusion Detection for Web Servers. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Dong Seong Kim 0001, Jong Sou Park Network-Based Intrusion Detection with Support Vector Machines. Search on Bibsonomy ICOIN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Dick O'Brien, Rick Smith, Tammy Kappel, Clint Bitzer Intrusion Tolerance Via Network Layer Controls. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe An Architecture for an Adaptive Intrusion-Tolerant Server. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Gene Itkis Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia 0001 Intrusion-Tolerant Architectures: Concepts and Design. Search on Bibsonomy WADS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30P. C. Chan, Victor K. Wei Preemptive Distributed Intrusion Detection Using Mobile Agents. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Deborah A. Frincke Balancing cooperation and risk in intrusion detection. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF authorization mechanisms, collaborative systems, access control models
30Dusan Bulatovic, Dusan M. Velasevic A Distributed Intrusion Detection System Based on Bayesian Alarm Networks. Search on Bibsonomy CQRE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
28Khalid Elbadawi, Ehab Al-Shaer TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF traffic replay, virtual machine, recovery, replay, intrusion, mitigation
28Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf Brefeld Active learning for network intrusion detection. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF machine learning, intrusion detection, network security, anomaly detection, active learning, support vector data description
28Julio Gómez, Consolación Gil, Nicolás Padilla, Raul Baños, C. Jiménez Design of a Snort-Based Hybrid Intrusion Detection System. Search on Bibsonomy IWANN (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, Intrusion detection systems, Snort, Network IDS
28Pei-Sheng Huang, Chung-Huang Yang, Tae-Nam Ahn Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection system, firewall, malware, worm, honeypot
28Adnan Nadeem, Michael P. Howarth Adaptive intrusion detection & prevention of denial of service attacks in MANETs. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection & prevention, ad-hoc network security
28Yu-Shu Chen, Yi-Ming Chen Combining incremental Hidden Markov Model and Adaboost algorithm for anomaly intrusion detection. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IHMM, anomaly intrusion detection, normal profile, adaboost
28Zahra Aghajani, Mohammad Abdollahi Azgomi Security Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic Activity Networks. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion tolerant web service (ITWS), stochastic activity networks (SANs), Security, modeling, evaluation
28Yunliang Chen, Jianzhong Huang 0001, Changsheng Xie, Yunfu Fang Storage-Based Intrusion Detection Using Artificial Immune Technique. Search on Bibsonomy ISICA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF artificial immune technique, intrusion detection, network security
28Mahmoud Jazzar, Aman Jantan An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction. Search on Bibsonomy Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF False alerts, Security, Intrusion detection, Fuzzy cognitive maps
28Álvaro Herrero 0001, Emilio Corchado, María A. Pellicer, Ajith Abraham Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization. Search on Bibsonomy Innovations in Hybrid Intelligent Systems The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion Detection, Artificial Neural Networks, Multiagent Systems, Unsupervised Learning, Computer Network Security, Projection Methods
28Dong Li, Zhitang Li, Jie Ma Processing Intrusion Detection Alerts in Large-scale Network. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion detection, large-scale network
28Giuliana Santos Veronese, Miguel Correia 0001, Lau Cheuk Lung, Paulo Veríssimo Finite Memory: A Vulnerability of Intrusion-Tolerant Systems. Search on Bibsonomy NCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Garbage Collection, Buffer Management, Intrusion Tolerance, Byzantine Fault Tolerance
28Christie I. Ezeife, Maxwell Ejelike, Akshai K. Aggarwal WIDS: a sensor-based online mining wireless intrusion detection system. Search on Bibsonomy IDEAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CommView for WIFI, hardware sensor, wireless attacks, wireless intrusion detection, clustering
28Danielle Chrun, Michel Cukier, Gerry Sneeringer Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Empirical Study, Security Metrics, Intrusion Prevention Systems
28Abdelraouf Ouadjaout, Yacine Challal, Noureddine Lasla, Miloud Bagaa SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Wireless sensor networks, Fault tolerance, Intrusion tolerance, Secure routing
28Mahmoud Jazzar, Aman Bin Jantan Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM-Based Intrusion Detection Sensors. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF False alerts, Security, Intrusion detection, Self organizing maps, Fuzzy cognitive maps
28Damiano Bolzoni, Sandro Etalle Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anomaly detection, intrusion detection systems, regular languages, Web application security
28Marcello Castellano, Giuseppe Mastronardi, Luca Pisciotta, Gianfranco Tarricone Composing Miners to Develop an Intrusion Detection Solution. Search on Bibsonomy PinKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Mining Engine, Data mining, Intrusion Detection, Knowledge Discovery, Web mining
28Rodrigo Werlinger, Kirstie Hawkey, Kasia Muldner, Pooya Jaferian, Konstantin Beznosov The challenges of using an intrusion detection system: is it worth the effort? Search on Bibsonomy SOUPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaboration, intrusion detection, usable security, security management, qualitative research, organizational factors, security tools
28Furong Wang, Chen Huang 0003, Jing Zhao, Chunming Rong IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trust, Ad hoc, evidence, intrusion
28Kuo-Chen Lee, Jason Chang, Ming-Syan Chen PAID: Packet Analysis for Anomaly Intrusion Detection. Search on Bibsonomy PAKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data Mining, Machine Learning, Intrusion Detection, Network Security
28Maya Shehab, Nashat Mansour, Ahmad Faour Growing Hierarchical Self-Organizing Map for Filtering Intrusion Detection Alarms. Search on Bibsonomy ISPAN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF alarm filtering, growing hierarchical self-organizing map, intrusion detection, self-organizing map, computer security
28Zorana Bankovic, Slobodan Bojanic, Octavio Nieto-Taladriz, Atta Badii Unsupervised Genetic Algorithm Deployed for Intrusion Detection. Search on Bibsonomy HAIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF genetic algorithm, intrusion detection, unsupervised
28Magnus Almgren, Ulf Lindqvist, Erland Jonsson A Multi-Sensor Model to Improve Automated Attack Detection. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF alert reasoning, intrusion detection
28Luciano Bononi, Carlo Tacconi Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure clustering and routing, Statistically unique and cryptographically verifiable identifiers, Mobile Ad Hoc and Vehicular Networks, Intrusion detection system
28Morteza Analoui, Behrouz Minaei-Bidgoli, Mohammad Hossein Rezvani Hierarchical two-tier ensemble learning: a new paradigm for network intrusion detection. Search on Bibsonomy PIKM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF intrusion detection system, pattern classification, classifier combining
28Paul W. Oman, Matthew Phillips Intrusion Detection and Event Monitoring in SCADA Networks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SCADA networks, Intrusion detection, real-time monitoring
28Junfeng Tian, Ning Li A New Proactive Defense Model Based on Intrusion Deception and Traceback. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion deception, Trap environment, Honeypot, Traceback
28E. Joseph Derrick, Richard W. Tibbs, Larry Lee Reynolds Jr. Investigating new approaches to data collection, management and analysis for network intrusion detection. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF data collection and analysis, data mining, wireless networks, data fusion, mobile sensors, network intrusion detection systems
28Xianghua Zhang, Jiwei Li, Zhaohui Jiang, Huanqing Feng Black-Box Extraction of Functional Structures from System Call Traces for Intrusion Detection. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF System Call Trace, Extraction of Function Structure, Black- Box Approach, Intrusion Detection
28Ramona Su Thompson, Esa M. Rantanen, William Yurcik, Brian P. Bailey Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection. Search on Bibsonomy CHI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF textual interfaces, intrusion detection, user study, network security, visual interfaces
28M. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi, Muddassar Farooq Extended thymus action for reducing false positives in ais based network intrusion detection systems. Search on Bibsonomy GECCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF artificial immune system, network intrusion detection
28José Fonseca 0002, Marco Vieira, Henrique Madeira Integrated Intrusion Detection in Databases. Search on Bibsonomy LADC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, Databases, intrusion detection
28Frédéric Massicotte, Mathieu Couture, Lionel C. Briand, Yvan Labiche Model-Driven, Network-Context Sensitive Intrusion Detection. Search on Bibsonomy MoDELS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF OCL constraints, Intrusion Detection, UML modeling
28Toshikazu Uemura, Tadashi Dohi Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF long-run average cost, information security, intrusion tolerance, preventive maintenance, semi-Markov models, DoS attack
28Hyun-A Park, Dong Hoon Lee 0001, Jongin Lim 0001, Sang Hyun Cho PPIDS: Privacy Preserving Intrusion Detection System. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Host-based IDS, Privacy, Intrusion Detection System, Audit log, Privacy Homomorphism
28Rung Ching Chen, Su-Ping Chen An Intrusion Detection Based on Support Vector Machines with a Voting Weight Schema. Search on Bibsonomy IEA/AIE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Support Vector Machine, Entropy, Intrusion Detection System, TF-IDF
28Solahuddin B. Shamsuddin, Michael E. Woodward Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data base, Anomaly, Network Intrusion Detection System
28Michele Colajanni, Daniele Gozzi, Mirco Marchetti Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems. Search on Bibsonomy ANCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF state migration, traffic analysis, distributed architectures, network intrusion detection systems
28Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 IDGraphs: Intrusion Detection and Analysis Using Stream Compositing. Search on Bibsonomy IEEE Computer Graphics and Applications The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Brushing and Linking, Intrusion Detection, Interactive System, Dynamic Query, Security Visualization, Correlation Matrix
28Zachary K. Baker, Viktor K. Prasanna Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF performance, Intrusion detection, partitioning, graph algorithms, FPGA design
28Konstantinos Xinidis, Ioannis Charitakis, Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos An Active Splitter Architecture for Intrusion Detection and Prevention. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network processors, Network-level security and protection, intrusion detection and prevention
28Olivier Dousse, Christina Tavoularis, Patrick Thiran Delay of intrusion detection in wireless sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, intrusion detection, delay, percolation
28Jiong Zhang, Mohammad Zulkernine A Hybrid Network Intrusion Detection Technique Using Random Forests. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hybrid detection, Data mining, Intrusion detection, Network security, Random forests
28Lei Chen, Chung-wei Lee, Wen-Chen Hu Gene intrusion on a society of Hill-Climbers. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Evolutionary Computation (EC), Gene Intrusion (GI), Generic Algorithm (GA), Society of Hill-Climbers (SoHC)
28Jianxin Wang 0001, Ying An, Yu Sheng, Shaohua Li 0006 IDSVL: Intrusion Detection System Virtual Lab Based on Component in the Internet. Search on Bibsonomy ICWL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF intrusion detection system, Java applet, virtual lab, Java bean
28Adebayo O. Adetunmbi, Zhiwei Shi, Zhongzhi Shi, Olumide S. Adewale Network Anomalous Intrusion Detection using Fuzzy-Bayes. Search on Bibsonomy Intelligent Information Processing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF naïve-Bayes, intrusion detection, fuzzy
28Jianhua Yang, Yongzhong Zhang Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCP packet-matching, intrusion detection, Network security, round-trip time, stepping-stone
28Sang Hyun Oh, Jin-Suk Kang, Yung-Cheol Byun, Taikyeong T. Jeong, Won Suk Lee Anomaly Intrusion Detection Based on Clustering a Data Stream. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data mining, Clustering, Intrusion detection, Data stream, Anomaly detection
28Michael Hilker, Christoph Schommer Description of bad-signatures for network intrusion detection. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF data streams, anomaly detection, artificial immune system, network intrusion detection
28Salvatore D'Antonio, Francesco Oliviero, Roberto Setola High-Speed Intrusion Detection in Support of Critical Infrastructure Protection. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF critical infrastructure protection (CIP), critical information infrastructure protection (CIIP), flow monitoring, intrusion detection, security management, SCADA
28Mehran Nadjarbashi-Noghani, Ali A. Ghorbani 0001 Design and implementation of a behavioral difference analyzer for network intrusion detection. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF differential analyzer, intrusion detection, network security, diversity
28Sung Woo Shin, Chi Hoon Lee Using Attack-Specific Feature Subsets for Network Intrusion Detection. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2006 DBLP  DOI  BibTeX  RDF class-specific learning, genetic algorithm, data mining, feature selection, Network intrusion detection
28Ioannis Sourdis, Vassilis Dimopoulos, Dionisios N. Pnevmatikatos, Stamatis Vassiliadis Packet pre-filtering for network intrusion detection. Search on Bibsonomy ANCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF packet inspection, packet pre-filtering, intrusion detection
28Simon P. Chung, Aloysius K. Mok Allergy Attack Against Automatic Signature Generation. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Automatic Signature Generation, Adaptive Response, Intrusion Prevention
28Debin Gao, Michael K. Reiter, Dawn Xiaodong Song Behavioral Distance Measurement Using Hidden Markov Models. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF behavioral distance, intrusion detection, anomaly detection, system call
28Qiang Duan, Chenyi Hu, Han-Chieh Wei Enhancing network intrusion detection systems with interval methods. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF intrusion detection, network control, interval method
28Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 IDGraphs: Intrusion Detection and Analysis Using Histographs. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Brushing and Linking, Visualization, Intrusion Detection, Interactive System, Dynamic Query, Correlation Matrix
28Gary Stein, Bing Chen, Annie S. Wu, Kien A. Hua Decision tree classifier for network intrusion detection with GA-based feature selection. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF genetic algorithm, intrusion detection, decision trees
28Giorgio Giacinto, Roberto Perdisci, Fabio Roli Alarm Clustering for Intrusion Detection Systems in Computer Networks. Search on Bibsonomy MLDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Clustering, Intrusion detection, Computer Security
28Weidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. Search on Bibsonomy ICAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion-tolerant computing, survivable service, buffer overflow, self-healing, rootkits, chip multi processor
28Ana Paula R. da Silva, Marcelo H. T. Martins, Bruno P. S. Rocha, Antonio Alfredo Ferreira Loureiro, Linnyer Beatrys Ruiz, Hao Chi Wong Decentralized intrusion detection in wireless sensor networks. Search on Bibsonomy Q2SWinet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, wireless sensor networks, intrusion detection
28Liwu Zhang, Dengguo Feng Intrusion Tolerant CA Scheme with Cheaters Detection Ability. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion Tolerance, Proactive, Threshold Signature, CA
28Junfeng Tian, Weidong Zhao, Ruizhong Du, Zhe Zhang A New Data Fusion Model of Intrusion Detection-IDSFP. Search on Bibsonomy ISPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Situation Estimation, Intrusion Detection, Network Security, Data Fusion, Alert Correlation, D-S Evidence Theory
28Pradeep Kannadiga, Mohammad Zulkernine, Sheikh Iqbal Ahamed Towards an Intrusion Detection System for Pervasive Computing Environments. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Pervasive computing security, intrusion detection and mobile agents
28Wei Hu, Weiming Hu Network-Based Intrusion Detection Using Adaboost Algorithm. Search on Bibsonomy Web Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network-based IDS, Computational complexity, Intrusion detection, AdaBoost
28Abdulrahman Alharby, Hideki Imai Hybrid Intrusion Detection Model Based on Ordered Sequences. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF continuous pattern, discontinuous pattern, data mining, intrusion detection
28Zachary K. Baker, Viktor K. Prasanna High-throughput linked-pattern matching for intrusion detection systems. Search on Bibsonomy ANCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF string matching, network intrusion detection
28Chris Muelder, Kwan-Liu Ma, Tony Bartoletti Interactive Visualization for Network and Port Scan Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network scans, user interfaces, information visualization, intrusion detection, Network security, port scans
28Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer A Comprehensive Approach to Intrusion Detection Alert Correlation. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF alert reduction, correlation data sets, Intrusion detection, alert correlation
28Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Singh 0001, Timothy K. Tsai SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Voice over IP system, Cross-protocol detection, Stateful detection, Intrusion detection, SIP, RTP
28Gautam Singaraju, Lawrence Teo, Yuliang Zheng 0001 A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF TIDeS, Environment Profile, Scalability, Fuzzy Logic, Intrusion Detection, Testbed, Evaluation Framework
28Uwe Aickelin, Julie Greensmith, Jamie Twycross Immune System Approaches to Intrusion Detection - A Review. Search on Bibsonomy ICARIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Artificial immune systems, intrusion detection systems, literature review
28Stefano Zanero, Sergio M. Savaresi Unsupervised learning techniques for an intrusion detection system. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF principal direction divisive partitioning, quality of clusters, intrusion detection, self-organizing maps, anomaly detection, K-means, unsupervised clustering
28Liu Fang, Chen Zhen-guo Intrusion Detection Based on Organizational Coevolutionary Fuzzy Classifiers. Search on Bibsonomy Intelligent Information Processing The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Organization CoEvolutionary, Fuzzy Logic, Intrusion detection, Anomaly detection
28Fernando Godínez, Dieter Hutter, Raúl Monroy Service Discrimination and Audit File Reduction for Effective Intrusion Detection. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Object Reduction, Intrusion Detection, Dimensionality Reduction, Misuse Detection
28Lap-Chung Lam, Tzi-cker Chiueh Automatic Extraction of Accurate Application-Specific Sandboxing Policy. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF system call graph, non-deterministic finite state automaton, intrusion detection, sandboxing, mimicry attack
28Suresh Chari, Pau-Chen Cheng BlueBoX: A policy-driven, host-based intrusion detection system. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF system call introspection, Intrusion detection, policy, sandboxing
28Nicholas Athanasiades, Randal T. Abler, John G. Levine, Henry L. Owen, George F. Riley Intrusion Detection Testing and Benchmarking Methodologies. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion Detection Testing, Network Attack Generation, Hacker Tools, Network Security
28Matthew Eric Otey, Srinivasan Parthasarathy 0001, Amol Ghoting, G. Li, Sundeep Narravula, Dhabaleswar K. Panda 0001 Towards NIC-based intrusion detection. Search on Bibsonomy KDD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF network interface cards, data mining, network security, network intrusion detection, NICs
28William H. Allen, Gerald A. Marin On the Self-similarity of Synthetic Traffic for the Evaluation of Intrusion Detection Systems. Search on Bibsonomy SAINT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF network data analysis, DARPA evaluation data, intrusion detection, self-similarity, traffic generation
28Dae-Sik Choi, Eul-Gyu Im, Cheol Won Lee Intrusion-Tolerant System Design for Web Server Survivability. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF web services, survivability, intrusion tolerance
28Xinzhou Qin, Wenke Lee Statistical Causality Analysis of INFOSEC Alert Data. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF attack scenario analysis, Intrusion detection, time series analysis, alert correlation
28Vishal Mittal, Giovanni Vigna Sensor-based intrusion detection for intra-domain distance-vector routing. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF intrusion detection, network topology, routing security
28David A. Wagner 0001, Paolo Soto Mimicry attacks on host-based intrusion detection systems. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anomaly detection, host-based intrusion detection, evasion attacks
28Christopher Krügel, Thomas Toth, Engin Kirda Service specific anomaly detection for network intrusion detection. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anomaly eetection, intrusion eetection, network security
28Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer Stateful Intrusion Detection for High-Speed Networks. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Intrusion Detection, High-Speed Networks, Security Analysis
28Shu Wenhui, Daniel Tan A Novel Intrusion Detection System Model for Securing Web-based Database Systems. Search on Bibsonomy COMPSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Web-based Database System, Security, Intrusion Detection System(IDS)
28Victor C. S. Lee, John A. Stankovic, Sang Hyuk Son Intrusion Detection in Real-Time Database Systems via Time Signatures. Search on Bibsonomy IEEE Real Time Technology and Applications Symposium The full citation details ... 2000 DBLP  DOI  BibTeX  RDF time signature, performance evaluation, intrusion detection, real-time database systems
28James Cannady Applying CMAC-Based On-Line Learning to Intrusion Detection. Search on Bibsonomy IJCNN (5) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Intrusion detection, CMAC, denial of service attacks
28Erland Jonsson, Tomas Olovsson A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF operational security, modeling, metric, Computer security, attacks, intrusion
Displaying result #401 - #500 of 13052 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license