The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for IDS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1992 (34) 1993-1994 (22) 1995-1996 (22) 1997-1999 (16) 2000 (17) 2001 (26) 2002 (42) 2003 (49) 2004 (84) 2005 (143) 2006 (162) 2007 (158) 2008 (145) 2009 (120) 2010 (55) 2011 (28) 2012 (41) 2013 (41) 2014 (32) 2015 (36) 2016 (99) 2017 (28) 2018 (106) 2019 (114) 2020 (116) 2021 (110) 2022 (158) 2023 (173) 2024 (46)
Publication types (Num. hits)
article(491) book(2) data(3) incollection(6) inproceedings(1707) phdthesis(4) proceedings(10)
Venues (Conferences, Journals, ...)
BigDataSecurity/HPSC/IDS(307) CoRR(88) IDS(63) BigDataSecurity(36) IEEE Access(29) RAID(27) Comput. Secur.(16) ACSAC(15) AINA(14) IWCMC(14) ICC(13) ISI(13) Recent Advances in Intrusion D...(12) SAINT(10) Sensors(10) ARES(9) More (+10 of total 934)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1161 occurrences of 620 keywords

Results
Found 2227 publication records. Showing 2223 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Michael Halper, James Geller, Yehoshua Perl, Erich J. Neuhold A Graphical Schema Representation for Object-Oriented Databases. Search on Bibsonomy IDS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
19Peter J. Barclay, Colin M. Fraser, Jessie B. Kennedy Using a Persistent System to Construct a Customised Interface to an Ecological Database. Search on Bibsonomy IDS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
19Jian Zhao 0009, Bernd Kostka, Adrian Müller An Integrated Approach to Task-Oriented Database Retrieval Interfaces. Search on Bibsonomy IDS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
19Rogério Carapuça, Artur Serrano, José Farinha Automatic Derivation of Graphical Human-Machine Interfaces for Databases. Search on Bibsonomy IDS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
19John E. Bell Experiences of New Users of a Natural Language Interface to a Relational Database in a Controlled Setting. Search on Bibsonomy IDS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
19Toshikazu Kato Cognitive View Mechanism for Content-based Multimedia Information Retrieval. Search on Bibsonomy IDS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
19Moira C. Norrie An Interactive System for Object-Oriented Database Design. Search on Bibsonomy IDS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
19Jacques Durand, Hans Brunner, Rob Cuthbertson, Steve Fogel, Tim McCandless, Randall Sparks, Loren Sylvan Data Model and Query Algebra for a Model-Based, Multi-Modal User Interface. Search on Bibsonomy IDS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
18Nils Ulltveit-Moe, Vladimir A. Oleshchuk Privacy Violation Classification of Snort Ruleset. Search on Bibsonomy PDP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF privacy violation, classification, IDS, rules
18Jean-Baptiste Voron, Clement Demoulins, Fabrice Kordon Adaptable Intrusion Detection Systems Dedicated to Concurrent Programs: A Petri Net-Based Approach. Search on Bibsonomy ACSD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, Petri nets, static analysis, observers, IDS, behavior modeling, automatic code generation
18Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Seung Jo Han A Novel Cross Layer Intrusion Detection System in MANET. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF MANET, IDS, DoS, Cross layer, AODV
18Anas Al-Roubaiey, Tarek R. Sheltami, Ashraf S. Mahmoud, Elhadi M. Shakshuki, Hussein T. Mouftah AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Watchdog, TWOACK, AACK, Misbehaving, MANET, IDS, DSR, packet dropping
18Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi Early DoS/DDoS Detection Method using Short-term Statistics. Search on Bibsonomy CISIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF DoS/DDoS attacks, Short-term entropy, A test of significance, IDS, Statistical Method
18Tarek R. Sheltami, Anas Al-Roubaiey, Elhadi M. Shakshuki, Ashraf S. Hasan Mahmoud Video transmission enhancement in presence of misbehaving nodes in MANETs. Search on Bibsonomy Multim. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Watchdog, TWOACK, Misbehaving nodes, H264, MANET, IDS, DSR, MPEG4
18Thomas Haigh How Data Got its Base: Information Storage Software in the 1950s and 1960s. Search on Bibsonomy IEEE Ann. Hist. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 9PAC, DBTG, Surge, report generation and file maintenance, database management system (DBMS), IDS, Share, IMS, data processing, Codasyl
18Yong Wang, Dawu Gu, Wei Li 0013, Hongjiao Li, Jing Li Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network. Search on Bibsonomy ISNN (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Neural Network, Workflow, IDS, BP
18Robert Koch 0002 Changing Network Behavior. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sFlow, NBA, Fast Learning ANN, IDS, Modular Neural Networks, NetFlow
18Yaping Jiang, Jianhua Zhou, Yong Gan, Zengyu Cai A Method of In-Depth-Defense for Network Security Based on Immunity Principles. Search on Bibsonomy ISPA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network defense, Network security, AIS, IDS
18Varsha Sainani, Mei-Ling Shyu A Hybrid Layered Multiagent Architecture with Low Cost and Low Response Time Communication Protocol for Network Intrusion Detection Systems. Search on Bibsonomy AINA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IDS, Agent Architecture, Agent Communication, KQML
18Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte Execution Patterns in Automatic Malware and Human-Centric Attacks. Search on Bibsonomy NCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, model, evaluation, IDS, Attack, malware
18Tae-Sub Kim, Yi-Kang Kim, Byung-Bog Lee, Seungwan Ryu, Choong-Ho Cho Designs of a Secure Wireless LAN Access Technique and an Intrusion Detection System for Home Network. Search on Bibsonomy NCM (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF homenetwork, WLAN, IDS, authentication protocol
18Salem Benferhat, Tayeb Kenaza, Aïcha Mokhtari A Naive Bayes Approach for Detecting Coordinated Attacks. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF coordinated attacks, Bayesian networks, IDS
18Christian Callegari, Stefano Giordano, Michele Pagano Application of Wavelet Packet Transform to Network Anomaly Detection. Search on Bibsonomy NEW2AN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Best Basis, Anomaly Detection, IDS, Wavelet Packet
18Cristian Pinzón, Yanira de Paz, Javier Bajo A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode. Search on Bibsonomy DCAI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security database, Multi-agent, IDS, case-based reasoning, SQL injection
18Bo-Chao Cheng, Ming-Jen Chen, Yuan-Sun Chu, Andrew Chen, Sujadi Yap, Kuo-Pao Fan SIPS: A Stateful and Flow-Based Intrusion Prevention System for Email Applications. Search on Bibsonomy NPC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Network Security, SPAM, IDS, SIPS, IPS, SMTP
18Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura A Hybrid Command Sequence Model for Anomaly Detection. Search on Bibsonomy PAKDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Command sequence, User model, Anomaly detection, Computer security, IDS, GA
18David J. Malan, Michael D. Smith 0001 Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF collaborative detection, native API, win32, IDS, worms, windows, system calls, temporal consistency, peers, system services, host-based intrusion detection, HIDS
18Masato Masuya, Takashi Yamanoue, Shinichiro Kubota An experience of monitoring university network security using a commercial service and DIY monitoring. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fire wall, security, network, monitor, policy, IDS, audit
18Kurniadi Asrigo, Lionel Litty, David Lie Using VMM-based sensors to monitor honeypots. Search on Bibsonomy VEE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF honeypot monitoring, intrusion detection, IDS, virtual machine monitor
18I. A. Almerhag, Michael E. Woodward Security as a quality of service routing problem. Search on Bibsonomy CoNEXT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF quality of service, authentication, network security, encryption, IDS, firewalls, routing metric
18Shigeyuki Matsuda, Tatsuya Baba, Akihiro Hayakawa, Taichi Nakamura Design and Implementation of Unauthorized Access Tracing System. Search on Bibsonomy SAINT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF network security, IDS, traceback, unauthorized access, DOS
18Yoshinori Okazaki, Izuru Sato, Shigeki Goto A New Intrusion Detection Method based on Process Profiling. Search on Bibsonomy SAINT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MID, DP matching m, Intrusion Detection, Profile, IDS, AID
18Frédéric Cuppens Managing Alerts in a Multi-Intrusion Detection Environmen. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF IDMEF, cooperative intrusion detection, alert clustering, alert merging, IDS, DTD
18Edward F. Ewen, Carl Medsker, Laura E. Dusterhoft, Kelly LeVan-Shultz, James L. Smith, Milton A. Gottschall Data Warehousing in an Integrated Health System: Building the Business Case. Search on Bibsonomy DOLAP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF integrated delivery system, integrated health system, DSS, decision support system, data warehouse, OLAP, healthcare, IDS, on-line analytical processing, IHS
17Moriteru Ishida, Hiroki Takakura, Yasuo Okabe High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF anomaly based IDS, OptiGrid, clustering, intrusion detection system, cluster labelling
17Michele Colajanni, Mirco Marchetti, Michele Messori Selective and Early Threat Detection in Large Networked Systems. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Alert ranking, intrusion detection systems, early warning, distributed IDS
17Monis Akhlaq, Faeiz Alserhani, Ahsan Subhan, Irfan-Ullah Awan, John Mellor, Pravin Mirchandani High Speed NIDS using Dynamic Cluster and Comparator Logic. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Comparator Logic, Loadbalancer, Policy Routing, Intrusion Detection Systems (IDS), Dynamic Cluster, Snort, Plugins
17Ming-Yang Su, Kun-Lin Chiang, Wei-Cheng Liao Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks. Search on Bibsonomy ISPA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF MANETs (Mobile ad hoc networks), black hole attack, intrusion detection system (IDS)
17Yu-Sung Wu, Vinita Apte, Saurabh Bagchi, Sachin Garg, Navjot Singh 0001 Intrusion detection in voice over IP environments. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Voice over IP system, Cross-protocol detection, Stateful detection, Correlation-based IDS, Intrusion detection, SIP, RTP
17Luis de Marcos, José Ramón Hilera, José Antonio Gutiérrez 0001, Salvador Otón SISCOVET: Control System of Transport Vehicle Drivers Using GPS Location and Identification through the Electronic ID Card. Search on Bibsonomy WSKS (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DNI-e (e-IDs), GPS, bluetooth, Wi-Fi, transport, wireless technologies
17Jing Xu 0009, Christian R. Shelton Continuous Time Bayesian Networks for Host Level Network Intrusion Detection. Search on Bibsonomy ECML/PKDD (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CTBNs, Host Based IDS, Unsupervised Machine Learning
17Olalekan Adeyinka Internet Attack Methods and Internet Security Technology. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy, Cryptography, Integrity, Intrusion Detection Systems (IDS), Confidentiality, Firewall, Worms, Virus
17Simon P. Chung, Aloysius K. Mok Swarm Attacks against Network-Level Emulation/Analysis. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Decoder detection, network-level emulation, swarm attacks, network IDS, evasion
17Tarik Taleb, Zubair Md. Fadlullah, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato Tracing back attacks against encrypted protocols. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encryption, intrusion detection system (IDS), traceback
17Subrat Kumar Dash, Sanjay Rawat 0001, Arun K. Pujari Use of Dimensionality Reduction for Intrusion Detection. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Host Based IDS, Data Mining, Dimensionality Reduction, System Calls, Locally Linear Embedding
17Walter Geisselhardt, Taswar Iqbal High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents. Search on Bibsonomy IWDW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart IDs, data tampering, entertainment tickets protection, printing scanning, 2-D Bar codes, HD-DataStripe, data encoding in background images, biometrics, watermarking, copy detection, counterfeiting, halftone images
17Wei Hu, Weiming Hu Network-Based Intrusion Detection Using Adaboost Algorithm. Search on Bibsonomy Web Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network-based IDS, Computational complexity, Intrusion detection, AdaBoost
17Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Nigel H. Lin, Louis H. Lin A Behavior-Based Anti-Worm System. Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Lambent Anti-Worm System (LAWS), Malicious worm, Mobile Agent, Intrusion Detection System (IDS)
17Ellen Isaacs, Alan Walendowski, Dipti Ranganthan Hubbub: a sound-enhanced mobile instant messenger that supports awareness and opportunistic interactions. Search on Bibsonomy CHI The full citation details ... 2002 DBLP  DOI  BibTeX  RDF sound IDs, sound instant messages, mobile computing, wireless, awareness, instant messaging, earcons, Palm
17Ho-Yen Chang, Shyhtsun Felix Wu, Y. Frank Jou Real-time protocol analysis for detecting link-state routing protocol attacks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF OSPF attacks, knowledge-based IDS, link-state routing protocol security, real-time misuse intrusion detection, real-time network protocol analysis, timed finite state machine, event correlation
17Shu Wenhui, Daniel Tan A Novel Intrusion Detection System Model for Securing Web-based Database Systems. Search on Bibsonomy COMPSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Web-based Database System, Security, Intrusion Detection System(IDS)
16Kai Chen 0005, Chuanxiong Guo, Haitao Wu, Jing Yuan, Zhenqian Feng, Yan Chen 0004, Songwu Lu, Wenfei Wu Generic and automatic address configuration for data center networks. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF address configuration, graph isomorphism, data center networks
16Prashant Doshi, Yifeng Zeng, Qiongyu Chen Graphical models for interactive POMDPs: representations and solutions. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Interactive POMDPs, Sequential multiagent decision making, Probabilistic graphical models
16Jinchuan Chen, Reynold Cheng, Mohamed F. Mokbel, Chi-Yin Chow Scalable processing of snapshot and continuous nearest-neighbor queries over one-dimensional uncertain data. Search on Bibsonomy VLDB J. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Probabilistic nearest-neighbor query, Partial evaluation, Continuous query, Uncertain data, Incremental evaluation
16Guang Yang 0001 Discovering Significant Places from Mobile Phones - A Mass Market Solution. Search on Bibsonomy MELT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Ioannis Caragiannis Efficient coordination mechanisms for unrelated machine scheduling. Search on Bibsonomy SODA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Iren Lorenzo-Fonseca, Francisco Maciá Pérez, Francisco José Mora-Gimeno, Rogelio Lau-Fernández, Juan Antonio Gil-Martínez-Abarca, Diego Marcos-Jorquera Intrusion Detection Method Using Neural Networks Based on the Reduction of Characteristics. Search on Bibsonomy IWANN (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Neural networks, Intrusion detection, Principal component analysis, Anomaly detection
16Jonas Hörnstein, Lisa Gustavsson, Francisco Lacerda, José Santos-Victor Multimodal word learning from Infant Directed Speech. Search on Bibsonomy IROS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Hao Yan, Shuai Ding 0006, Torsten Suel Inverted index compression and query processing with optimized document ordering. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IR query processing, document ordering, search engines, inverted index, index compression
16Mojtaba Torkjazi, Reza Rejaie, Walter Willinger Hot today, gone tomorrow: on the migration of MySpace users. Search on Bibsonomy WOSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF OSN eco-system, user dynamics and activities, online social networks
16Martin Rehák, Eugen Staab, Volker Fusenig, Jan Stiborek, Martin Grill, Karel Bartos, Michal Pechoucek, Thomas Engel 0001 Threat-model-driven runtime adaptation and evaluation of intrusion detection system. Search on Bibsonomy ICAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network behavior analysis, intrusion detection, self-adaptation, attack trees
16Zhenyun Zhuang, Ying Li, Zesheng Chen PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Balaji Rajendran, Dnyanesh Pawar An intelligent contextual support system for intrusion detection tasks. Search on Bibsonomy CHIMIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF contextual support system, intelligent contextual support systems, network security engineer, network security system, intrusion detection, intrusion detection system
16Zenghui Liu, Yingxu Lai A Data Mining Framework for Building Intrusion Detection Models Based on IPv6. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Robert Koch 0002, Gabi Dreo Fast Learning Neural Network Intrusion Detection System. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Yoann Dieudonné, Shlomi Dolev, Franck Petit, Michael Segal 0001 Deaf, Dumb, and Chatting Asynchronous Robots. Search on Bibsonomy OPODIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Explicit Communication, Stigmergy, Mobile Robot Networks
16Eli Gafni The extended BG-simulation and the characterization of t-resiliency. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF solvability, t-resiliency, decidability, symmetry breaking, wait-freedom, renaming
16Chung-Ming Ou, Chung-Ren Ou Multi-Agent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory. Search on Bibsonomy KES-AMSTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Shu Chen, Yingying Chen 0001, Wade Trappe Exploiting environmental properties for wireless localization. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee Alert propagation in mobile ad hoc networks. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Hai Zhuge, Xue Chen, Xiaoping Sun, Erlin Yao HRing: A Structured P2P Overlay Based on Harmonic Series. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF routing, Overlay Network, range query, structured P2P
16Zhenwei Yu 0001, Jeffrey J. P. Tsai, Thomas J. Weigert An adaptive automatically tuning intrusion detection system. Search on Bibsonomy ACM Trans. Auton. Adapt. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, Fuzzy control
16Tor M. Aamodt, Paul Chow Compile-time and instruction-set methods for improving floating- to fixed-point conversion accuracy. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fractional multiplication, Compilation, digital signal processing, scaling, fixed-point, signal-to-noise ratio
16Daniel S. Fava, Stephen R. Byers, Shanchieh Jay Yang Projecting Cyberattacks Through Variable-Length Markov Models. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16David J. Coumou, Gaurav Sharma 0001 Insertion, Deletion Codes With Feature-Based Embedding: A New Paradigm for Watermark Synchronization With Applications to Speech Watermarking. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Álvaro Herrero 0001, Emilio Corchado, María A. Pellicer, Ajith Abraham Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization. Search on Bibsonomy Innovations in Hybrid Intelligent Systems The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion Detection, Artificial Neural Networks, Multiagent Systems, Unsupervised Learning, Computer Network Security, Projection Methods
16Tich Phuoc Tran, Pohsiang Tsai, Tony Jan A Multi-expert Classification Framework with Transferable Voting for Intrusion Detection. Search on Bibsonomy ICMLA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Hamid Mohamadi, Jafar Habibi, Mohammad Saniee Abadeh Misuse Intrusion Detection Using a Fuzzy-Metaheuristic Approach. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Mixia Liu, Qiuyu Zhang, Zhao Hong, Dongmei Yu Network Security Situation Assessment Based on Data Fusion. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Zhengbing Hu, Zhitang Li, Junqi Wu A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Erik F. Golen, Nirmala Shenoy, Xiaojun Cao A Low Latency Scheme for Bulk RFID Tag Reading. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Terrence P. Fries A fuzzy-genetic approach to network intrusion detection. Search on Bibsonomy GECCO (Companion) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, genetic algorithms, intrusion detection, fuzzy sets
16Magnus Almgren, Ulf Lindqvist, Erland Jonsson A Multi-Sensor Model to Improve Automated Attack Detection. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF alert reasoning, intrusion detection
16Huy Anh Nguyen, Deokjai Choi 0001 Application of Data Mining to Network Intrusion Detection: Classifier Selection Model. Search on Bibsonomy APNOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF KDD dataset, Data mining, Machine learning, Intrusion detection, Network security, Classifier, Algorithm selection
16Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 How to Monitor for Missing RFID tags. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Wan Tang, Yang Cao, Xi-Min Yang, Won-Ho So Study on Adaptive Intrusion Detection Engine Based on Gene Expression Programming Rules. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Timothy Buennemeyer, Theresa M. Nelson, Lee M. Clagett, John Paul Dunning, Randy C. Marchany, Joseph G. Tront Mobile Device Profiling and Intrusion Detection Using Smart Batteries. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Xue Li, Haidong Fu, Siliang Huang Design of a Dendritic Cells inspired Model Based on Danger Theory for Intrusion Detection System. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Ioanna Kantzavelou, Sokratis K. Katsikas A Generic Intrusion Detection Game Model in IT Security. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF internal attacker, Intrusion Detection, noncooperative Game Theory
16Sebastian A. Weiß, Wolfgang Müller 0004 The Potential of Interactive Digital Storytelling for the Creation of Educational Computer Games. Search on Bibsonomy Edutainment The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Educational Computer Games, Scenejo, Killer Phrase Game, Learning, Serious Games, Game-based Learning, Interactive Digital Storytelling
16Mohammad Zulkernine, Mathew Graves, Muhammad Umair Ahmed Khan Integrating software specifications into intrusion detection. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Software specification languages, Intrusion detection, State machines, Attack scenarios
16Ramana Rao Kompella, Sumeet Singh, George Varghese On scalable attack detection in the network. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF data structures, denial of service, routers, scanning, streaming algorithms, network attacks, syn flooding
16Carmen Lacave, Manuel Luque, Francisco Javier Díez 0001 Explanation of Bayesian Networks and Influence Diagrams in Elvira. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Sartid Vongpradhip, Wichet Plaimart Survival Architecture for Distributed Intrusion Detection System (dIDS) using Mobile Agent. Search on Bibsonomy NCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mobile agent, Network security, Distributed denial-of-service, Security architecture, security engineering, Distributed intrusion detection systems
16Ulrike Spierling Adding Aspects of "Implicit Creation" to the Authoring Process in Interactive Storytelling. Search on Bibsonomy International Conference on Virtual Storytelling The full citation details ... 2007 DBLP  DOI  BibTeX  RDF implicit creation, storyworld, authoring, emergence, interactive digital storytelling, emergent narrative
16Charles R. Haag, Gary B. Lamont, Paul D. Williams, Gilbert L. Peterson An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions. Search on Bibsonomy ICARIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Arturo Servin, Daniel Kudenko Multi-agent Reinforcement Learning for Intrusion Detection. Search on Bibsonomy Adaptive Agents and Multi-Agents Systems The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Jan Magott, Pawel Skrobanek, Marek Woda Analysis of Timing Requirements for Intrusion Detection System. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Álvaro Herrero 0001, Emilio Corchado, Paolo Gastaldo, Davide Leoncini, Francesco Picasso, Rodolfo Zunino Intrusion Detection at Packet Level by Unsupervised Architectures. Search on Bibsonomy IDEAL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Auto Associative Back Propagation, Network Security, Self-Organizing Map, Intrusion Detection System, Vector Quantization
Displaying result #601 - #700 of 2223 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license