|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1161 occurrences of 620 keywords
|
|
|
Results
Found 2227 publication records. Showing 2223 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Michael Halper, James Geller, Yehoshua Perl, Erich J. Neuhold |
A Graphical Schema Representation for Object-Oriented Databases. |
IDS |
1992 |
DBLP DOI BibTeX RDF |
|
19 | Peter J. Barclay, Colin M. Fraser, Jessie B. Kennedy |
Using a Persistent System to Construct a Customised Interface to an Ecological Database. |
IDS |
1992 |
DBLP DOI BibTeX RDF |
|
19 | Jian Zhao 0009, Bernd Kostka, Adrian Müller |
An Integrated Approach to Task-Oriented Database Retrieval Interfaces. |
IDS |
1992 |
DBLP DOI BibTeX RDF |
|
19 | Rogério Carapuça, Artur Serrano, José Farinha |
Automatic Derivation of Graphical Human-Machine Interfaces for Databases. |
IDS |
1992 |
DBLP DOI BibTeX RDF |
|
19 | John E. Bell |
Experiences of New Users of a Natural Language Interface to a Relational Database in a Controlled Setting. |
IDS |
1992 |
DBLP DOI BibTeX RDF |
|
19 | Toshikazu Kato |
Cognitive View Mechanism for Content-based Multimedia Information Retrieval. |
IDS |
1992 |
DBLP DOI BibTeX RDF |
|
19 | Moira C. Norrie |
An Interactive System for Object-Oriented Database Design. |
IDS |
1992 |
DBLP DOI BibTeX RDF |
|
19 | Jacques Durand, Hans Brunner, Rob Cuthbertson, Steve Fogel, Tim McCandless, Randall Sparks, Loren Sylvan |
Data Model and Query Algebra for a Model-Based, Multi-Modal User Interface. |
IDS |
1992 |
DBLP DOI BibTeX RDF |
|
18 | Nils Ulltveit-Moe, Vladimir A. Oleshchuk |
Privacy Violation Classification of Snort Ruleset. |
PDP |
2010 |
DBLP DOI BibTeX RDF |
privacy violation, classification, IDS, rules |
18 | Jean-Baptiste Voron, Clement Demoulins, Fabrice Kordon |
Adaptable Intrusion Detection Systems Dedicated to Concurrent Programs: A Petri Net-Based Approach. |
ACSD |
2010 |
DBLP DOI BibTeX RDF |
security, Petri nets, static analysis, observers, IDS, behavior modeling, automatic code generation |
18 | Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Seung Jo Han |
A Novel Cross Layer Intrusion Detection System in MANET. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
MANET, IDS, DoS, Cross layer, AODV |
18 | Anas Al-Roubaiey, Tarek R. Sheltami, Ashraf S. Mahmoud, Elhadi M. Shakshuki, Hussein T. Mouftah |
AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
Watchdog, TWOACK, AACK, Misbehaving, MANET, IDS, DSR, packet dropping |
18 | Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi |
Early DoS/DDoS Detection Method using Short-term Statistics. |
CISIS |
2010 |
DBLP DOI BibTeX RDF |
DoS/DDoS attacks, Short-term entropy, A test of significance, IDS, Statistical Method |
18 | Tarek R. Sheltami, Anas Al-Roubaiey, Elhadi M. Shakshuki, Ashraf S. Hasan Mahmoud |
Video transmission enhancement in presence of misbehaving nodes in MANETs. |
Multim. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Watchdog, TWOACK, Misbehaving nodes, H264, MANET, IDS, DSR, MPEG4 |
18 | Thomas Haigh |
How Data Got its Base: Information Storage Software in the 1950s and 1960s. |
IEEE Ann. Hist. Comput. |
2009 |
DBLP DOI BibTeX RDF |
9PAC, DBTG, Surge, report generation and file maintenance, database management system (DBMS), IDS, Share, IMS, data processing, Codasyl |
18 | Yong Wang, Dawu Gu, Wei Li 0013, Hongjiao Li, Jing Li |
Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network. |
ISNN (1) |
2009 |
DBLP DOI BibTeX RDF |
Neural Network, Workflow, IDS, BP |
18 | Robert Koch 0002 |
Changing Network Behavior. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
sFlow, NBA, Fast Learning ANN, IDS, Modular Neural Networks, NetFlow |
18 | Yaping Jiang, Jianhua Zhou, Yong Gan, Zengyu Cai |
A Method of In-Depth-Defense for Network Security Based on Immunity Principles. |
ISPA |
2009 |
DBLP DOI BibTeX RDF |
network defense, Network security, AIS, IDS |
18 | Varsha Sainani, Mei-Ling Shyu |
A Hybrid Layered Multiagent Architecture with Low Cost and Low Response Time Communication Protocol for Network Intrusion Detection Systems. |
AINA |
2009 |
DBLP DOI BibTeX RDF |
IDS, Agent Architecture, Agent Communication, KQML |
18 | Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte |
Execution Patterns in Automatic Malware and Human-Centric Attacks. |
NCA |
2008 |
DBLP DOI BibTeX RDF |
security, model, evaluation, IDS, Attack, malware |
18 | Tae-Sub Kim, Yi-Kang Kim, Byung-Bog Lee, Seungwan Ryu, Choong-Ho Cho |
Designs of a Secure Wireless LAN Access Technique and an Intrusion Detection System for Home Network. |
NCM (1) |
2008 |
DBLP DOI BibTeX RDF |
homenetwork, WLAN, IDS, authentication protocol |
18 | Salem Benferhat, Tayeb Kenaza, Aïcha Mokhtari |
A Naive Bayes Approach for Detecting Coordinated Attacks. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
coordinated attacks, Bayesian networks, IDS |
18 | Christian Callegari, Stefano Giordano, Michele Pagano |
Application of Wavelet Packet Transform to Network Anomaly Detection. |
NEW2AN |
2008 |
DBLP DOI BibTeX RDF |
Best Basis, Anomaly Detection, IDS, Wavelet Packet |
18 | Cristian Pinzón, Yanira de Paz, Javier Bajo |
A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode. |
DCAI |
2008 |
DBLP DOI BibTeX RDF |
Security database, Multi-agent, IDS, case-based reasoning, SQL injection |
18 | Bo-Chao Cheng, Ming-Jen Chen, Yuan-Sun Chu, Andrew Chen, Sujadi Yap, Kuo-Pao Fan |
SIPS: A Stateful and Flow-Based Intrusion Prevention System for Email Applications. |
NPC |
2007 |
DBLP DOI BibTeX RDF |
Network Security, SPAM, IDS, SIPS, IPS, SMTP |
18 | Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura |
A Hybrid Command Sequence Model for Anomaly Detection. |
PAKDD |
2007 |
DBLP DOI BibTeX RDF |
Command sequence, User model, Anomaly detection, Computer security, IDS, GA |
18 | David J. Malan, Michael D. Smith 0001 |
Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
collaborative detection, native API, win32, IDS, worms, windows, system calls, temporal consistency, peers, system services, host-based intrusion detection, HIDS |
18 | Masato Masuya, Takashi Yamanoue, Shinichiro Kubota |
An experience of monitoring university network security using a commercial service and DIY monitoring. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
fire wall, security, network, monitor, policy, IDS, audit |
18 | Kurniadi Asrigo, Lionel Litty, David Lie |
Using VMM-based sensors to monitor honeypots. |
VEE |
2006 |
DBLP DOI BibTeX RDF |
honeypot monitoring, intrusion detection, IDS, virtual machine monitor |
18 | I. A. Almerhag, Michael E. Woodward |
Security as a quality of service routing problem. |
CoNEXT |
2005 |
DBLP DOI BibTeX RDF |
quality of service, authentication, network security, encryption, IDS, firewalls, routing metric |
18 | Shigeyuki Matsuda, Tatsuya Baba, Akihiro Hayakawa, Taichi Nakamura |
Design and Implementation of Unauthorized Access Tracing System. |
SAINT |
2002 |
DBLP DOI BibTeX RDF |
network security, IDS, traceback, unauthorized access, DOS |
18 | Yoshinori Okazaki, Izuru Sato, Shigeki Goto |
A New Intrusion Detection Method based on Process Profiling. |
SAINT |
2002 |
DBLP DOI BibTeX RDF |
MID, DP matching m, Intrusion Detection, Profile, IDS, AID |
18 | Frédéric Cuppens |
Managing Alerts in a Multi-Intrusion Detection Environmen. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
IDMEF, cooperative intrusion detection, alert clustering, alert merging, IDS, DTD |
18 | Edward F. Ewen, Carl Medsker, Laura E. Dusterhoft, Kelly LeVan-Shultz, James L. Smith, Milton A. Gottschall |
Data Warehousing in an Integrated Health System: Building the Business Case. |
DOLAP |
1998 |
DBLP DOI BibTeX RDF |
integrated delivery system, integrated health system, DSS, decision support system, data warehouse, OLAP, healthcare, IDS, on-line analytical processing, IHS |
17 | Moriteru Ishida, Hiroki Takakura, Yasuo Okabe |
High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling. |
SAINT |
2011 |
DBLP DOI BibTeX RDF |
anomaly based IDS, OptiGrid, clustering, intrusion detection system, cluster labelling |
17 | Michele Colajanni, Mirco Marchetti, Michele Messori |
Selective and Early Threat Detection in Large Networked Systems. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Alert ranking, intrusion detection systems, early warning, distributed IDS |
17 | Monis Akhlaq, Faeiz Alserhani, Ahsan Subhan, Irfan-Ullah Awan, John Mellor, Pravin Mirchandani |
High Speed NIDS using Dynamic Cluster and Comparator Logic. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Comparator Logic, Loadbalancer, Policy Routing, Intrusion Detection Systems (IDS), Dynamic Cluster, Snort, Plugins |
17 | Ming-Yang Su, Kun-Lin Chiang, Wei-Cheng Liao |
Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks. |
ISPA |
2010 |
DBLP DOI BibTeX RDF |
MANETs (Mobile ad hoc networks), black hole attack, intrusion detection system (IDS) |
17 | Yu-Sung Wu, Vinita Apte, Saurabh Bagchi, Sachin Garg, Navjot Singh 0001 |
Intrusion detection in voice over IP environments. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Voice over IP system, Cross-protocol detection, Stateful detection, Correlation-based IDS, Intrusion detection, SIP, RTP |
17 | Luis de Marcos, José Ramón Hilera, José Antonio Gutiérrez 0001, Salvador Otón |
SISCOVET: Control System of Transport Vehicle Drivers Using GPS Location and Identification through the Electronic ID Card. |
WSKS (1) |
2009 |
DBLP DOI BibTeX RDF |
DNI-e (e-IDs), GPS, bluetooth, Wi-Fi, transport, wireless technologies |
17 | Jing Xu 0009, Christian R. Shelton |
Continuous Time Bayesian Networks for Host Level Network Intrusion Detection. |
ECML/PKDD (2) |
2008 |
DBLP DOI BibTeX RDF |
CTBNs, Host Based IDS, Unsupervised Machine Learning |
17 | Olalekan Adeyinka |
Internet Attack Methods and Internet Security Technology. |
Asia International Conference on Modelling and Simulation |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Cryptography, Integrity, Intrusion Detection Systems (IDS), Confidentiality, Firewall, Worms, Virus |
17 | Simon P. Chung, Aloysius K. Mok |
Swarm Attacks against Network-Level Emulation/Analysis. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Decoder detection, network-level emulation, swarm attacks, network IDS, evasion |
17 | Tarik Taleb, Zubair Md. Fadlullah, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato |
Tracing back attacks against encrypted protocols. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
encryption, intrusion detection system (IDS), traceback |
17 | Subrat Kumar Dash, Sanjay Rawat 0001, Arun K. Pujari |
Use of Dimensionality Reduction for Intrusion Detection. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Host Based IDS, Data Mining, Dimensionality Reduction, System Calls, Locally Linear Embedding |
17 | Walter Geisselhardt, Taswar Iqbal |
High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents. |
IWDW |
2007 |
DBLP DOI BibTeX RDF |
Smart IDs, data tampering, entertainment tickets protection, printing scanning, 2-D Bar codes, HD-DataStripe, data encoding in background images, biometrics, watermarking, copy detection, counterfeiting, halftone images |
17 | Wei Hu, Weiming Hu |
Network-Based Intrusion Detection Using Adaboost Algorithm. |
Web Intelligence |
2005 |
DBLP DOI BibTeX RDF |
Network-based IDS, Computational complexity, Intrusion detection, AdaBoost |
17 | Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Nigel H. Lin, Louis H. Lin |
A Behavior-Based Anti-Worm System. |
AINA |
2003 |
DBLP DOI BibTeX RDF |
Lambent Anti-Worm System (LAWS), Malicious worm, Mobile Agent, Intrusion Detection System (IDS) |
17 | Ellen Isaacs, Alan Walendowski, Dipti Ranganthan |
Hubbub: a sound-enhanced mobile instant messenger that supports awareness and opportunistic interactions. |
CHI |
2002 |
DBLP DOI BibTeX RDF |
sound IDs, sound instant messages, mobile computing, wireless, awareness, instant messaging, earcons, Palm |
17 | Ho-Yen Chang, Shyhtsun Felix Wu, Y. Frank Jou |
Real-time protocol analysis for detecting link-state routing protocol attacks. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
OSPF attacks, knowledge-based IDS, link-state routing protocol security, real-time misuse intrusion detection, real-time network protocol analysis, timed finite state machine, event correlation |
17 | Shu Wenhui, Daniel Tan |
A Novel Intrusion Detection System Model for Securing Web-based Database Systems. |
COMPSAC |
2001 |
DBLP DOI BibTeX RDF |
Web-based Database System, Security, Intrusion Detection System(IDS) |
16 | Kai Chen 0005, Chuanxiong Guo, Haitao Wu, Jing Yuan, Zhenqian Feng, Yan Chen 0004, Songwu Lu, Wenfei Wu |
Generic and automatic address configuration for data center networks. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
address configuration, graph isomorphism, data center networks |
16 | Prashant Doshi, Yifeng Zeng, Qiongyu Chen |
Graphical models for interactive POMDPs: representations and solutions. |
Auton. Agents Multi Agent Syst. |
2009 |
DBLP DOI BibTeX RDF |
Interactive POMDPs, Sequential multiagent decision making, Probabilistic graphical models |
16 | Jinchuan Chen, Reynold Cheng, Mohamed F. Mokbel, Chi-Yin Chow |
Scalable processing of snapshot and continuous nearest-neighbor queries over one-dimensional uncertain data. |
VLDB J. |
2009 |
DBLP DOI BibTeX RDF |
Probabilistic nearest-neighbor query, Partial evaluation, Continuous query, Uncertain data, Incremental evaluation |
16 | Guang Yang 0001 |
Discovering Significant Places from Mobile Phones - A Mass Market Solution. |
MELT |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof |
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Ioannis Caragiannis |
Efficient coordination mechanisms for unrelated machine scheduling. |
SODA |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Iren Lorenzo-Fonseca, Francisco Maciá Pérez, Francisco José Mora-Gimeno, Rogelio Lau-Fernández, Juan Antonio Gil-Martínez-Abarca, Diego Marcos-Jorquera |
Intrusion Detection Method Using Neural Networks Based on the Reduction of Characteristics. |
IWANN (1) |
2009 |
DBLP DOI BibTeX RDF |
Neural networks, Intrusion detection, Principal component analysis, Anomaly detection |
16 | Jonas Hörnstein, Lisa Gustavsson, Francisco Lacerda, José Santos-Victor |
Multimodal word learning from Infant Directed Speech. |
IROS |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Hao Yan, Shuai Ding 0006, Torsten Suel |
Inverted index compression and query processing with optimized document ordering. |
WWW |
2009 |
DBLP DOI BibTeX RDF |
IR query processing, document ordering, search engines, inverted index, index compression |
16 | Mojtaba Torkjazi, Reza Rejaie, Walter Willinger |
Hot today, gone tomorrow: on the migration of MySpace users. |
WOSN |
2009 |
DBLP DOI BibTeX RDF |
OSN eco-system, user dynamics and activities, online social networks |
16 | Martin Rehák, Eugen Staab, Volker Fusenig, Jan Stiborek, Martin Grill, Karel Bartos, Michal Pechoucek, Thomas Engel 0001 |
Threat-model-driven runtime adaptation and evaluation of intrusion detection system. |
ICAC |
2009 |
DBLP DOI BibTeX RDF |
network behavior analysis, intrusion detection, self-adaptation, attack trees |
16 | Zhenyun Zhuang, Ying Li, Zesheng Chen |
PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Balaji Rajendran, Dnyanesh Pawar |
An intelligent contextual support system for intrusion detection tasks. |
CHIMIT |
2009 |
DBLP DOI BibTeX RDF |
contextual support system, intelligent contextual support systems, network security engineer, network security system, intrusion detection, intrusion detection system |
16 | Zenghui Liu, Yingxu Lai |
A Data Mining Framework for Building Intrusion Detection Models Based on IPv6. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Robert Koch 0002, Gabi Dreo |
Fast Learning Neural Network Intrusion Detection System. (PDF / PS) |
AIMS |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Yoann Dieudonné, Shlomi Dolev, Franck Petit, Michael Segal 0001 |
Deaf, Dumb, and Chatting Asynchronous Robots. |
OPODIS |
2009 |
DBLP DOI BibTeX RDF |
Explicit Communication, Stigmergy, Mobile Robot Networks |
16 | Eli Gafni |
The extended BG-simulation and the characterization of t-resiliency. |
STOC |
2009 |
DBLP DOI BibTeX RDF |
solvability, t-resiliency, decidability, symmetry breaking, wait-freedom, renaming |
16 | Chung-Ming Ou, Chung-Ren Ou |
Multi-Agent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory. |
KES-AMSTA |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Shu Chen, Yingying Chen 0001, Wade Trappe |
Exploiting environmental properties for wireless localization. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee |
Alert propagation in mobile ad hoc networks. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Hai Zhuge, Xue Chen, Xiaoping Sun, Erlin Yao |
HRing: A Structured P2P Overlay Based on Harmonic Series. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
routing, Overlay Network, range query, structured P2P |
16 | Zhenwei Yu 0001, Jeffrey J. P. Tsai, Thomas J. Weigert |
An adaptive automatically tuning intrusion detection system. |
ACM Trans. Auton. Adapt. Syst. |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, Fuzzy control |
16 | Tor M. Aamodt, Paul Chow |
Compile-time and instruction-set methods for improving floating- to fixed-point conversion accuracy. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
fractional multiplication, Compilation, digital signal processing, scaling, fixed-point, signal-to-noise ratio |
16 | Daniel S. Fava, Stephen R. Byers, Shanchieh Jay Yang |
Projecting Cyberattacks Through Variable-Length Markov Models. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | David J. Coumou, Gaurav Sharma 0001 |
Insertion, Deletion Codes With Feature-Based Embedding: A New Paradigm for Watermark Synchronization With Applications to Speech Watermarking. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Álvaro Herrero 0001, Emilio Corchado, María A. Pellicer, Ajith Abraham |
Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization. |
Innovations in Hybrid Intelligent Systems |
2008 |
DBLP DOI BibTeX RDF |
Intrusion Detection, Artificial Neural Networks, Multiagent Systems, Unsupervised Learning, Computer Network Security, Projection Methods |
16 | Tich Phuoc Tran, Pohsiang Tsai, Tony Jan |
A Multi-expert Classification Framework with Transferable Voting for Intrusion Detection. |
ICMLA |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Hamid Mohamadi, Jafar Habibi, Mohammad Saniee Abadeh |
Misuse Intrusion Detection Using a Fuzzy-Metaheuristic Approach. |
Asia International Conference on Modelling and Simulation |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Mixia Liu, Qiuyu Zhang, Zhao Hong, Dongmei Yu |
Network Security Situation Assessment Based on Data Fusion. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Zhengbing Hu, Zhitang Li, Junqi Wu |
A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Erik F. Golen, Nirmala Shenoy, Xiaojun Cao |
A Low Latency Scheme for Bulk RFID Tag Reading. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Terrence P. Fries |
A fuzzy-genetic approach to network intrusion detection. |
GECCO (Companion) |
2008 |
DBLP DOI BibTeX RDF |
security, genetic algorithms, intrusion detection, fuzzy sets |
16 | Magnus Almgren, Ulf Lindqvist, Erland Jonsson |
A Multi-Sensor Model to Improve Automated Attack Detection. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
alert reasoning, intrusion detection |
16 | Huy Anh Nguyen, Deokjai Choi 0001 |
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model. |
APNOMS |
2008 |
DBLP DOI BibTeX RDF |
KDD dataset, Data mining, Machine learning, Intrusion detection, Network security, Classifier, Algorithm selection |
16 | Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 |
How to Monitor for Missing RFID tags. |
ICDCS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Wan Tang, Yang Cao, Xi-Min Yang, Won-Ho So |
Study on Adaptive Intrusion Detection Engine Based on Gene Expression Programming Rules. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Timothy Buennemeyer, Theresa M. Nelson, Lee M. Clagett, John Paul Dunning, Randy C. Marchany, Joseph G. Tront |
Mobile Device Profiling and Intrusion Detection Using Smart Batteries. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Xue Li, Haidong Fu, Siliang Huang |
Design of a Dendritic Cells inspired Model Based on Danger Theory for Intrusion Detection System. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Ioanna Kantzavelou, Sokratis K. Katsikas |
A Generic Intrusion Detection Game Model in IT Security. |
TrustBus |
2008 |
DBLP DOI BibTeX RDF |
internal attacker, Intrusion Detection, noncooperative Game Theory |
16 | Sebastian A. Weiß, Wolfgang Müller 0004 |
The Potential of Interactive Digital Storytelling for the Creation of Educational Computer Games. |
Edutainment |
2008 |
DBLP DOI BibTeX RDF |
Educational Computer Games, Scenejo, Killer Phrase Game, Learning, Serious Games, Game-based Learning, Interactive Digital Storytelling |
16 | Mohammad Zulkernine, Mathew Graves, Muhammad Umair Ahmed Khan |
Integrating software specifications into intrusion detection. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Software specification languages, Intrusion detection, State machines, Attack scenarios |
16 | Ramana Rao Kompella, Sumeet Singh, George Varghese |
On scalable attack detection in the network. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
data structures, denial of service, routers, scanning, streaming algorithms, network attacks, syn flooding |
16 | Carmen Lacave, Manuel Luque, Francisco Javier Díez 0001 |
Explanation of Bayesian Networks and Influence Diagrams in Elvira. |
IEEE Trans. Syst. Man Cybern. Part B |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Sartid Vongpradhip, Wichet Plaimart |
Survival Architecture for Distributed Intrusion Detection System (dIDS) using Mobile Agent. |
NCA |
2007 |
DBLP DOI BibTeX RDF |
Mobile agent, Network security, Distributed denial-of-service, Security architecture, security engineering, Distributed intrusion detection systems |
16 | Ulrike Spierling |
Adding Aspects of "Implicit Creation" to the Authoring Process in Interactive Storytelling. |
International Conference on Virtual Storytelling |
2007 |
DBLP DOI BibTeX RDF |
implicit creation, storyworld, authoring, emergence, interactive digital storytelling, emergent narrative |
16 | Charles R. Haag, Gary B. Lamont, Paul D. Williams, Gilbert L. Peterson |
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions. |
ICARIS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Arturo Servin, Daniel Kudenko |
Multi-agent Reinforcement Learning for Intrusion Detection. |
Adaptive Agents and Multi-Agents Systems |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Jan Magott, Pawel Skrobanek, Marek Woda |
Analysis of Timing Requirements for Intrusion Detection System. |
DepCoS-RELCOMEX |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Álvaro Herrero 0001, Emilio Corchado, Paolo Gastaldo, Davide Leoncini, Francesco Picasso, Rodolfo Zunino |
Intrusion Detection at Packet Level by Unsupervised Architectures. |
IDEAL |
2007 |
DBLP DOI BibTeX RDF |
Auto Associative Back Propagation, Network Security, Self-Organizing Map, Intrusion Detection System, Vector Quantization |
Displaying result #601 - #700 of 2223 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|