|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1161 occurrences of 620 keywords
|
|
|
Results
Found 2227 publication records. Showing 2223 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Michael Halper, James Geller, Yehoshua Perl, Erich J. Neuhold |
A Graphical Schema Representation for Object-Oriented Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Database Systems (IDS92), Proceedings of the First International Workshop on Interfaces to Database Systems, Glasgow, UK, 1-3 July 1992, pp. 282-307, 1992, Springer, 3-540-19802-4. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
19 | Peter J. Barclay, Colin M. Fraser, Jessie B. Kennedy |
Using a Persistent System to Construct a Customised Interface to an Ecological Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Database Systems (IDS92), Proceedings of the First International Workshop on Interfaces to Database Systems, Glasgow, UK, 1-3 July 1992, pp. 225-243, 1992, Springer, 3-540-19802-4. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
19 | Jian Zhao 0009, Bernd Kostka, Adrian Müller |
An Integrated Approach to Task-Oriented Database Retrieval Interfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Database Systems (IDS92), Proceedings of the First International Workshop on Interfaces to Database Systems, Glasgow, UK, 1-3 July 1992, pp. 56-73, 1992, Springer, 3-540-19802-4. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
19 | Rogério Carapuça, Artur Serrano, José Farinha |
Automatic Derivation of Graphical Human-Machine Interfaces for Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Database Systems (IDS92), Proceedings of the First International Workshop on Interfaces to Database Systems, Glasgow, UK, 1-3 July 1992, pp. 176-192, 1992, Springer, 3-540-19802-4. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
19 | John E. Bell |
Experiences of New Users of a Natural Language Interface to a Relational Database in a Controlled Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Database Systems (IDS92), Proceedings of the First International Workshop on Interfaces to Database Systems, Glasgow, UK, 1-3 July 1992, pp. 433-454, 1992, Springer, 3-540-19802-4. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
19 | Toshikazu Kato |
Cognitive View Mechanism for Content-based Multimedia Information Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Database Systems (IDS92), Proceedings of the First International Workshop on Interfaces to Database Systems, Glasgow, UK, 1-3 July 1992, pp. 244-262, 1992, Springer, 3-540-19802-4. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
19 | Moira C. Norrie |
An Interactive System for Object-Oriented Database Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Database Systems (IDS92), Proceedings of the First International Workshop on Interfaces to Database Systems, Glasgow, UK, 1-3 July 1992, pp. 9-24, 1992, Springer, 3-540-19802-4. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
19 | Jacques Durand, Hans Brunner, Rob Cuthbertson, Steve Fogel, Tim McCandless, Randall Sparks, Loren Sylvan |
Data Model and Query Algebra for a Model-Based, Multi-Modal User Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDS ![In: Interfaces to Database Systems (IDS92), Proceedings of the First International Workshop on Interfaces to Database Systems, Glasgow, UK, 1-3 July 1992, pp. 311-337, 1992, Springer, 3-540-19802-4. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
18 | Nils Ulltveit-Moe, Vladimir A. Oleshchuk |
Privacy Violation Classification of Snort Ruleset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: Proceedings of the 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, PDP 2010, Pisa, Italy, February 17-19, 2010, pp. 654-658, 2010, IEEE Computer Society, 978-0-7695-3939-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy violation, classification, IDS, rules |
18 | Jean-Baptiste Voron, Clement Demoulins, Fabrice Kordon |
Adaptable Intrusion Detection Systems Dedicated to Concurrent Programs: A Petri Net-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSD ![In: 10th International Conference on Application of Concurrency to System Design, ACSD 2010, Braga, Portugal, 21-25 June 2010, pp. 57-66, 2010, IEEE Computer Society, 978-0-7695-4066-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, Petri nets, static analysis, observers, IDS, behavior modeling, automatic code generation |
18 | Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Seung Jo Han |
A Novel Cross Layer Intrusion Detection System in MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010, pp. 647-654, 2010, IEEE Computer Society, 978-0-7695-4018-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
MANET, IDS, DoS, Cross layer, AODV |
18 | Anas Al-Roubaiey, Tarek R. Sheltami, Ashraf S. Mahmoud, Elhadi M. Shakshuki, Hussein T. Mouftah |
AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010, pp. 634-640, 2010, IEEE Computer Society, 978-0-7695-4018-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Watchdog, TWOACK, AACK, Misbehaving, MANET, IDS, DSR, packet dropping |
18 | Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi |
Early DoS/DDoS Detection Method using Short-term Statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: CISIS 2010, The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, 15-18 February 2010, pp. 168-173, 2010, IEEE Computer Society, 978-0-7695-3967-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
DoS/DDoS attacks, Short-term entropy, A test of significance, IDS, Statistical Method |
18 | Tarek R. Sheltami, Anas Al-Roubaiey, Elhadi M. Shakshuki, Ashraf S. Hasan Mahmoud |
Video transmission enhancement in presence of misbehaving nodes in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 15(5), pp. 273-282, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Watchdog, TWOACK, Misbehaving nodes, H264, MANET, IDS, DSR, MPEG4 |
18 | Thomas Haigh |
How Data Got its Base: Information Storage Software in the 1950s and 1960s. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Ann. Hist. Comput. ![In: IEEE Ann. Hist. Comput. 31(4), pp. 6-25, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
9PAC, DBTG, Surge, report generation and file maintenance, database management system (DBMS), IDS, Share, IMS, data processing, Codasyl |
18 | Yong Wang, Dawu Gu, Wei Li 0013, Hongjiao Li, Jing Li |
Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (1) ![In: Advances in Neural Networks - ISNN 2009, 6th International Symposium on Neural Networks, ISNN 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part I, pp. 60-67, 2009, Springer, 978-3-642-01506-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Neural Network, Workflow, IDS, BP |
18 | Robert Koch 0002 |
Changing Network Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 60-66, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
sFlow, NBA, Fast Learning ANN, IDS, Modular Neural Networks, NetFlow |
18 | Yaping Jiang, Jianhua Zhou, Yong Gan, Zengyu Cai |
A Method of In-Depth-Defense for Network Security Based on Immunity Principles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, Chengdu, Sichuan, China, 10-12 August 2009, pp. 484-487, 2009, IEEE Computer Society, 978-0-7695-3747-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network defense, Network security, AIS, IDS |
18 | Varsha Sainani, Mei-Ling Shyu |
A Hybrid Layered Multiagent Architecture with Low Cost and Low Response Time Communication Protocol for Network Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: The IEEE 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, United Kingdom, May 26-29, 2009, pp. 154-161, 2009, IEEE Computer Society, 978-0-7695-3638-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
IDS, Agent Architecture, Agent Communication, KQML |
18 | Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte |
Execution Patterns in Automatic Malware and Human-Centric Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, NCA 2008, July 10-12, 2008, Cambridge, Massachusetts, USA, pp. 29-36, 2008, IEEE Computer Society, 978-0-7695-3192-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, model, evaluation, IDS, Attack, malware |
18 | Tae-Sub Kim, Yi-Kang Kim, Byung-Bog Lee, Seungwan Ryu, Choong-Ho Cho |
Designs of a Secure Wireless LAN Access Technique and an Intrusion Detection System for Home Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM (1) ![In: NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008 - Volume 1, pp. 318-324, 2008, IEEE Computer Society, 978-0-7695-3322-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
homenetwork, WLAN, IDS, authentication protocol |
18 | Salem Benferhat, Tayeb Kenaza, Aïcha Mokhtari |
A Naive Bayes Approach for Detecting Coordinated Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 704-709, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
coordinated attacks, Bayesian networks, IDS |
18 | Christian Callegari, Stefano Giordano, Michele Pagano |
Application of Wavelet Packet Transform to Network Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEW2AN ![In: Next Generation Teletraffic and Wired/Wireless Advanced Networking, 8th International Conference, NEW2AN and 1st Russian Conference on Smart Spaces, ruSMART 2008, St. Petersburg, Russia, September 3-5, 2008. Proceedings, pp. 246-257, 2008, Springer, 978-3-540-85499-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Best Basis, Anomaly Detection, IDS, Wavelet Packet |
18 | Cristian Pinzón, Yanira de Paz, Javier Bajo |
A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCAI ![In: International Symposium on Distributed Computing and Artificial Intelligence, DCAI 2008, University of Salamanca, Spain, 22th-24th October 2008, pp. 180-188, 2008, Springer, 978-3-540-85862-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security database, Multi-agent, IDS, case-based reasoning, SQL injection |
18 | Bo-Chao Cheng, Ming-Jen Chen, Yuan-Sun Chu, Andrew Chen, Sujadi Yap, Kuo-Pao Fan |
SIPS: A Stateful and Flow-Based Intrusion Prevention System for Email Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2007, Dalian, China, September 18-21, 2007, Proceedings, pp. 334-343, 2007, Springer, 978-3-540-74783-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Network Security, SPAM, IDS, SIPS, IPS, SMTP |
18 | Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura |
A Hybrid Command Sequence Model for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 11th Pacific-Asia Conference, PAKDD 2007, Nanjing, China, May 22-25, 2007, Proceedings, pp. 108-118, 2007, Springer, 978-3-540-71700-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Command sequence, User model, Anomaly detection, Computer security, IDS, GA |
18 | David J. Malan, Michael D. Smith 0001 |
Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006, pp. 25-32, 2006, ACM Press, 1-59593-551-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
collaborative detection, native API, win32, IDS, worms, windows, system calls, temporal consistency, peers, system services, host-based intrusion detection, HIDS |
18 | Masato Masuya, Takashi Yamanoue, Shinichiro Kubota |
An experience of monitoring university network security using a commercial service and DIY monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services 2006, Edmonton, Alberta, Canada, November 5-8, 2006, pp. 225-230, 2006, ACM, 1-59593-438-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
fire wall, security, network, monitor, policy, IDS, audit |
18 | Kurniadi Asrigo, Lionel Litty, David Lie |
Using VMM-based sensors to monitor honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 2nd International Conference on Virtual Execution Environments, VEE 2006, Ottawa, Ontario, Canada, June 14-16, 2006, pp. 13-23, 2006, ACM, 978-1-59593-332-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
honeypot monitoring, intrusion detection, IDS, virtual machine monitor |
18 | I. A. Almerhag, Michael E. Woodward |
Security as a quality of service routing problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2005, Toulouse, France, October 24-27, 2005, pp. 222-223, 2005, ACM, 1-59593-197-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
quality of service, authentication, network security, encryption, IDS, firewalls, routing metric |
18 | Shigeyuki Matsuda, Tatsuya Baba, Akihiro Hayakawa, Taichi Nakamura |
Design and Implementation of Unauthorized Access Tracing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January - 1 February 2002, Nara City, Japan, Proceedings, pp. 74-81, 2002, IEEE Computer Society, 0-7695-1447-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
network security, IDS, traceback, unauthorized access, DOS |
18 | Yoshinori Okazaki, Izuru Sato, Shigeki Goto |
A New Intrusion Detection Method based on Process Profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January - 1 February 2002, Nara City, Japan, Proceedings, pp. 82-91, 2002, IEEE Computer Society, 0-7695-1447-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
MID, DP matching m, Intrusion Detection, Profile, IDS, AID |
18 | Frédéric Cuppens |
Managing Alerts in a Multi-Intrusion Detection Environmen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 22-31, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
IDMEF, cooperative intrusion detection, alert clustering, alert merging, IDS, DTD |
18 | Edward F. Ewen, Carl Medsker, Laura E. Dusterhoft, Kelly LeVan-Shultz, James L. Smith, Milton A. Gottschall |
Data Warehousing in an Integrated Health System: Building the Business Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DOLAP ![In: DOLAP '98, ACM First International Workshop on Data Warehousing and OLAP, November 7, 1998, Bethesda, Maryland, USA, Proceedings, pp. 47-53, 1998, ACM. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
integrated delivery system, integrated health system, DSS, decision support system, data warehouse, OLAP, healthcare, IDS, on-line analytical processing, IHS |
17 | Moriteru Ishida, Hiroki Takakura, Yasuo Okabe |
High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings, pp. 11-19, 2011, IEEE Computer Society, 978-1-4577-0531-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
anomaly based IDS, OptiGrid, clustering, intrusion detection system, cluster labelling |
17 | Michele Colajanni, Mirco Marchetti, Michele Messori |
Selective and Early Threat Detection in Large Networked Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 604-611, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Alert ranking, intrusion detection systems, early warning, distributed IDS |
17 | Monis Akhlaq, Faeiz Alserhani, Ahsan Subhan, Irfan-Ullah Awan, John Mellor, Pravin Mirchandani |
High Speed NIDS using Dynamic Cluster and Comparator Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 575-581, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Comparator Logic, Loadbalancer, Policy Routing, Intrusion Detection Systems (IDS), Dynamic Cluster, Snort, Plugins |
17 | Ming-Yang Su, Kun-Lin Chiang, Wei-Cheng Liao |
Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010, Taipei, Taiwan, 6-9 September 2010, pp. 162-167, 2010, IEEE Computer Society, 978-1-4244-8095-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
MANETs (Mobile ad hoc networks), black hole attack, intrusion detection system (IDS) |
17 | Yu-Sung Wu, Vinita Apte, Saurabh Bagchi, Sachin Garg, Navjot Singh 0001 |
Intrusion detection in voice over IP environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(3), pp. 153-172, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Voice over IP system, Cross-protocol detection, Stateful detection, Correlation-based IDS, Intrusion detection, SIP, RTP |
17 | Luis de Marcos, José Ramón Hilera, José Antonio Gutiérrez 0001, Salvador Otón |
SISCOVET: Control System of Transport Vehicle Drivers Using GPS Location and Identification through the Electronic ID Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSKS (1) ![In: Visioning and Engineering the Knowledge Society. A Web Science Perspective, Second World Summit on the Knowledge Society, WSKS 2009, Chania, Crete, Greece, September 16-18, 2009. Proceedings, pp. 166-175, 2009, Springer, 978-3-642-04753-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DNI-e (e-IDs), GPS, bluetooth, Wi-Fi, transport, wireless technologies |
17 | Jing Xu 0009, Christian R. Shelton |
Continuous Time Bayesian Networks for Host Level Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECML/PKDD (2) ![In: Machine Learning and Knowledge Discovery in Databases, European Conference, ECML/PKDD 2008, Antwerp, Belgium, September 15-19, 2008, Proceedings, Part II, pp. 613-627, 2008, Springer, 978-3-540-87480-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
CTBNs, Host Based IDS, Unsupervised Machine Learning |
17 | Olalekan Adeyinka |
Internet Attack Methods and Internet Security Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: Second Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, Malaysia, May 13-15, 2008, pp. 77-82, 2008, IEEE Computer Society, 978-0-7695-3136-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Cryptography, Integrity, Intrusion Detection Systems (IDS), Confidentiality, Firewall, Worms, Virus |
17 | Simon P. Chung, Aloysius K. Mok |
Swarm Attacks against Network-Level Emulation/Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 175-190, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Decoder detection, network-level emulation, swarm attacks, network IDS, evasion |
17 | Tarik Taleb, Zubair Md. Fadlullah, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato |
Tracing back attacks against encrypted protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2007, Honolulu, Hawaii, USA, August 12-16, 2007, pp. 121-126, 2007, ACM, 978-1-59593-695-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
encryption, intrusion detection system (IDS), traceback |
17 | Subrat Kumar Dash, Sanjay Rawat 0001, Arun K. Pujari |
Use of Dimensionality Reduction for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 306-320, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Host Based IDS, Data Mining, Dimensionality Reduction, System Calls, Locally Linear Embedding |
17 | Walter Geisselhardt, Taswar Iqbal |
High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings, pp. 203-221, 2007, Springer, 978-3-540-92237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Smart IDs, data tampering, entertainment tickets protection, printing scanning, 2-D Bar codes, HD-DataStripe, data encoding in background images, biometrics, watermarking, copy detection, counterfeiting, halftone images |
17 | Wei Hu, Weiming Hu |
Network-Based Intrusion Detection Using Adaboost Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence ![In: 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 19-22 September 2005, Compiegne, France, pp. 712-717, 2005, IEEE Computer Society, 0-7695-2415-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Network-based IDS, Computational complexity, Intrusion detection, AdaBoost |
17 | Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Nigel H. Lin, Louis H. Lin |
A Behavior-Based Anti-Worm System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 17th International Conference on Advanced Information Networking and Applications (AINA'03), March 27-29, 2003, Xi'an, China, pp. 812-816, 2003, IEEE Computer Society, 0-7695-1906-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Lambent Anti-Worm System (LAWS), Malicious worm, Mobile Agent, Intrusion Detection System (IDS) |
17 | Ellen Isaacs, Alan Walendowski, Dipti Ranganthan |
Hubbub: a sound-enhanced mobile instant messenger that supports awareness and opportunistic interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the CHI 2002 Conference on Human Factors in Computing Systems: Changing our World, Changing ourselves, Minneapolis, Minnesota, USA, April 20-25, 2002., pp. 179-186, 2002, ACM, 1-58113-453-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
sound IDs, sound instant messages, mobile computing, wireless, awareness, instant messaging, earcons, Palm |
17 | Ho-Yen Chang, Shyhtsun Felix Wu, Y. Frank Jou |
Real-time protocol analysis for detecting link-state routing protocol attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(1), pp. 1-36, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
OSPF attacks, knowledge-based IDS, link-state routing protocol security, real-time misuse intrusion detection, real-time network protocol analysis, timed finite state machine, event correlation |
17 | Shu Wenhui, Daniel Tan |
A Novel Intrusion Detection System Model for Securing Web-based Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 25th International Computer Software and Applications Conference (COMPSAC 2001), Invigorating Software Development, 8-12 October 2001, Chicago, IL, USA, pp. 249-, 2001, IEEE Computer Society, 0-7695-1372-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Web-based Database System, Security, Intrusion Detection System(IDS) |
16 | Kai Chen 0005, Chuanxiong Guo, Haitao Wu, Jing Yuan, Zhenqian Feng, Yan Chen 0004, Songwu Lu, Wenfei Wu |
Generic and automatic address configuration for data center networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 39-50, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
address configuration, graph isomorphism, data center networks |
16 | Prashant Doshi, Yifeng Zeng, Qiongyu Chen |
Graphical models for interactive POMDPs: representations and solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Auton. Agents Multi Agent Syst. ![In: Auton. Agents Multi Agent Syst. 18(3), pp. 376-416, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Interactive POMDPs, Sequential multiagent decision making, Probabilistic graphical models |
16 | Jinchuan Chen, Reynold Cheng, Mohamed F. Mokbel, Chi-Yin Chow |
Scalable processing of snapshot and continuous nearest-neighbor queries over one-dimensional uncertain data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 18(5), pp. 1219-1240, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Probabilistic nearest-neighbor query, Partial evaluation, Continuous query, Uncertain data, Incremental evaluation |
16 | Guang Yang 0001 |
Discovering Significant Places from Mobile Phones - A Mass Market Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MELT ![In: Mobile Entity Localization and Tracking in GPS-less Environnments, Second International Workshop, MELT 2009, Orlando, FL, USA, September 30, 2009. Proceedings, pp. 34-49, 2009, Springer, 978-3-642-04378-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof |
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 154-157, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Ioannis Caragiannis |
Efficient coordination mechanisms for unrelated machine scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2009, New York, NY, USA, January 4-6, 2009, pp. 815-824, 2009, SIAM, 978-0-89871-680-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Iren Lorenzo-Fonseca, Francisco Maciá Pérez, Francisco José Mora-Gimeno, Rogelio Lau-Fernández, Juan Antonio Gil-Martínez-Abarca, Diego Marcos-Jorquera |
Intrusion Detection Method Using Neural Networks Based on the Reduction of Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWANN (1) ![In: Bio-Inspired Systems: Computational and Ambient Intelligence, 10th International Work-Conference on Artificial Neural Networks, IWANN 2009, Salamanca, Spain, June 10-12, 2009. Proceedings, Part I, pp. 1296-1303, 2009, Springer, 978-3-642-02477-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Neural networks, Intrusion detection, Principal component analysis, Anomaly detection |
16 | Jonas Hörnstein, Lisa Gustavsson, Francisco Lacerda, José Santos-Victor |
Multimodal word learning from Infant Directed Speech. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, October 11-15, 2009, St. Louis, MO, USA, pp. 2748-2754, 2009, IEEE, 978-1-4244-3803-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Hao Yan, Shuai Ding 0006, Torsten Suel |
Inverted index compression and query processing with optimized document ordering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 401-410, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
IR query processing, document ordering, search engines, inverted index, index compression |
16 | Mojtaba Torkjazi, Reza Rejaie, Walter Willinger |
Hot today, gone tomorrow: on the migration of MySpace users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSN ![In: Proceedings of the 2nd ACM Workshop on Online Social Networks, WOSN 2009, Barcelona, Spain, August 17, 2009, pp. 43-48, 2009, ACM, 978-1-60558-445-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
OSN eco-system, user dynamics and activities, online social networks |
16 | Martin Rehák, Eugen Staab, Volker Fusenig, Jan Stiborek, Martin Grill, Karel Bartos, Michal Pechoucek, Thomas Engel 0001 |
Threat-model-driven runtime adaptation and evaluation of intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAC ![In: Proceedings of the 6th International Conference on Autonomic Computing, ICAC 2009, June 15-19, 2009, Barcelona, Spain, pp. 65-66, 2009, ACM, 978-1-60558-564-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network behavior analysis, intrusion detection, self-adaptation, attack trees |
16 | Zhenyun Zhuang, Ying Li, Zesheng Chen |
PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1, pp. 392-399, 2009, IEEE Computer Society, 978-0-7695-3726-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Balaji Rajendran, Dnyanesh Pawar |
An intelligent contextual support system for intrusion detection tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHIMIT ![In: Proceedings of the 3rd ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT 2009, Baltimore, Maryland, USA, November 7-8, 2009, 2009, ACM, 978-1-60558-572-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
contextual support system, intelligent contextual support systems, network security engineer, network security system, intrusion detection, intrusion detection system |
16 | Zenghui Liu, Yingxu Lai |
A Data Mining Framework for Building Intrusion Detection Models Based on IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 608-618, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Robert Koch 0002, Gabi Dreo |
Fast Learning Neural Network Intrusion Detection System. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIMS ![In: Scalability of Networks and Services, Third International Conference on Autonomous Infrastructure, Management and Security, AIMS 2009, Enschede, The Netherlands, June 30-July 2, 2009. Proceedings, pp. 187-190, 2009, Springer, 978-3-642-02626-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Yoann Dieudonné, Shlomi Dolev, Franck Petit, Michael Segal 0001 |
Deaf, Dumb, and Chatting Asynchronous Robots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings, pp. 71-85, 2009, Springer, 978-3-642-10876-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Explicit Communication, Stigmergy, Mobile Robot Networks |
16 | Eli Gafni |
The extended BG-simulation and the characterization of t-resiliency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 85-92, 2009, ACM, 978-1-60558-506-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
solvability, t-resiliency, decidability, symmetry breaking, wait-freedom, renaming |
16 | Chung-Ming Ou, Chung-Ren Ou |
Multi-Agent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, Third KES International Symposium, KES-AMSTA 2009, Uppsala, Sweden, June 3-5, 2009. Proceedings, pp. 11-19, 2009, Springer, 978-3-642-01664-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Shu Chen, Yingying Chen 0001, Wade Trappe |
Exploiting environmental properties for wireless localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(1), pp. 49-51, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee |
Alert propagation in mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(1), pp. 23-25, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Hai Zhuge, Xue Chen, Xiaoping Sun, Erlin Yao |
HRing: A Structured P2P Overlay Based on Harmonic Series. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 19(2), pp. 145-158, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
routing, Overlay Network, range query, structured P2P |
16 | Zhenwei Yu 0001, Jeffrey J. P. Tsai, Thomas J. Weigert |
An adaptive automatically tuning intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Auton. Adapt. Syst. ![In: ACM Trans. Auton. Adapt. Syst. 3(3), pp. 10:1-10:25, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, Fuzzy control |
16 | Tor M. Aamodt, Paul Chow |
Compile-time and instruction-set methods for improving floating- to fixed-point conversion accuracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 7(3), pp. 26:1-26:27, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
fractional multiplication, Compilation, digital signal processing, scaling, fixed-point, signal-to-noise ratio |
16 | Daniel S. Fava, Stephen R. Byers, Shanchieh Jay Yang |
Projecting Cyberattacks Through Variable-Length Markov Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 3(3), pp. 359-369, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | David J. Coumou, Gaurav Sharma 0001 |
Insertion, Deletion Codes With Feature-Based Embedding: A New Paradigm for Watermark Synchronization With Applications to Speech Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 3(2), pp. 153-165, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Álvaro Herrero 0001, Emilio Corchado, María A. Pellicer, Ajith Abraham |
Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Innovations in Hybrid Intelligent Systems ![In: Innovations in Hybrid Intelligent Systems, pp. 320-328, 2008, Springer, 978-3-540-74971-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intrusion Detection, Artificial Neural Networks, Multiagent Systems, Unsupervised Learning, Computer Network Security, Projection Methods |
16 | Tich Phuoc Tran, Pohsiang Tsai, Tony Jan |
A Multi-expert Classification Framework with Transferable Voting for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLA ![In: Seventh International Conference on Machine Learning and Applications, ICMLA 2008, San Diego, California, USA, 11-13 December 2008, pp. 877-882, 2008, IEEE Computer Society, 978-0-7695-3495-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Hamid Mohamadi, Jafar Habibi, Mohammad Saniee Abadeh |
Misuse Intrusion Detection Using a Fuzzy-Metaheuristic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: Second Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, Malaysia, May 13-15, 2008, pp. 439-444, 2008, IEEE Computer Society, 978-0-7695-3136-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Mixia Liu, Qiuyu Zhang, Zhao Hong, Dongmei Yu |
Network Security Situation Assessment Based on Data Fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008, pp. 542-545, 2008, IEEE Computer Society, 0-7695-3090-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Zhengbing Hu, Zhitang Li, Junqi Wu |
A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008, pp. 10-16, 2008, IEEE Computer Society, 0-7695-3090-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Erik F. Golen, Nirmala Shenoy, Xiaojun Cao |
A Low Latency Scheme for Bulk RFID Tag Reading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 1565-1569, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Terrence P. Fries |
A fuzzy-genetic approach to network intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, Companion Material, pp. 2141-2146, 2008, ACM, 978-1-60558-131-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, genetic algorithms, intrusion detection, fuzzy sets |
16 | Magnus Almgren, Ulf Lindqvist, Erland Jonsson |
A Multi-Sensor Model to Improve Automated Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 291-310, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
alert reasoning, intrusion detection |
16 | Huy Anh Nguyen, Deokjai Choi 0001 |
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Challenges for Next Generation Network Operations and Service Management, 11th Asia-Pacific Network Operations and Management Symposium, APNOMS 2008, Beijing, China, October 22-24, 2008. Proceedings, pp. 399-408, 2008, Springer, 978-3-540-88622-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
KDD dataset, Data mining, Machine learning, Intrusion detection, Network security, Classifier, Algorithm selection |
16 | Chiu C. Tan 0001, Bo Sheng, Qun Li 0001 |
How to Monitor for Missing RFID tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17-20 June 2008, Beijing, China, pp. 295-302, 2008, IEEE Computer Society, 978-0-7695-3172-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Wan Tang, Yang Cao, Xi-Min Yang, Won-Ho So |
Study on Adaptive Intrusion Detection Engine Based on Gene Expression Programming Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 959-963, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Timothy Buennemeyer, Theresa M. Nelson, Lee M. Clagett, John Paul Dunning, Randy C. Marchany, Joseph G. Tront |
Mobile Device Profiling and Intrusion Detection Using Smart Batteries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 296, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Xue Li, Haidong Fu, Siliang Huang |
Design of a Dendritic Cells inspired Model Based on Danger Theory for Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 1137-1141, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Ioanna Kantzavelou, Sokratis K. Katsikas |
A Generic Intrusion Detection Game Model in IT Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings, pp. 151-162, 2008, Springer, 978-3-540-85734-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
internal attacker, Intrusion Detection, noncooperative Game Theory |
16 | Sebastian A. Weiß, Wolfgang Müller 0004 |
The Potential of Interactive Digital Storytelling for the Creation of Educational Computer Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Edutainment ![In: Technologies for E-Learning and Digital Entertainment, Third International Conference, Edutainment 2008, Nanjing, China, June 25-27, 2008, Proceedings, pp. 475-486, 2008, Springer, 978-3-540-69734-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Educational Computer Games, Scenejo, Killer Phrase Game, Learning, Serious Games, Game-based Learning, Interactive Digital Storytelling |
16 | Mohammad Zulkernine, Mathew Graves, Muhammad Umair Ahmed Khan |
Integrating software specifications into intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(5), pp. 345-357, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Software specification languages, Intrusion detection, State machines, Attack scenarios |
16 | Ramana Rao Kompella, Sumeet Singh, George Varghese |
On scalable attack detection in the network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 15(1), pp. 14-25, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
data structures, denial of service, routers, scanning, streaming algorithms, network attacks, syn flooding |
16 | Carmen Lacave, Manuel Luque, Francisco Javier Díez 0001 |
Explanation of Bayesian Networks and Influence Diagrams in Elvira. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part B ![In: IEEE Trans. Syst. Man Cybern. Part B 37(4), pp. 952-965, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Sartid Vongpradhip, Wichet Plaimart |
Survival Architecture for Distributed Intrusion Detection System (dIDS) using Mobile Agent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12 - 14 July 2007, Cambridge, MA, USA, pp. 332-338, 2007, IEEE Computer Society, 0-7695-2922-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Mobile agent, Network security, Distributed denial-of-service, Security architecture, security engineering, Distributed intrusion detection systems |
16 | Ulrike Spierling |
Adding Aspects of "Implicit Creation" to the Authoring Process in Interactive Storytelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Virtual Storytelling ![In: Virtual Storytelling. Using Virtual Reality Technologies for Storytelling, 4th International Conference, ICVS 2007, Saint-Malo, France, December 5-7, 2007, Proceedings, pp. 13-25, 2007, Springer, 978-3-540-77037-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
implicit creation, storyworld, authoring, emergence, interactive digital storytelling, emergent narrative |
16 | Charles R. Haag, Gary B. Lamont, Paul D. Williams, Gilbert L. Peterson |
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARIS ![In: Artificial Immune Systems, 6th International Conference, ICARIS 2007, Santos, Brazil, August 26-29, 2007, Proceedings, pp. 420-435, 2007, Springer, 978-3-540-73921-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Arturo Servin, Daniel Kudenko |
Multi-agent Reinforcement Learning for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adaptive Agents and Multi-Agents Systems ![In: Adaptive Agents and Multi-Agent Systems III. Adaptation and Multi-Agent Learning, 5th, 6th, and 7th European Symposium, ALAMAS 2005-2007 on Adaptive and Learning Agents and Multi-Agent Systems, Revised Selected Papers, pp. 211-223, 2007, Springer, 978-3-540-77947-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Jan Magott, Pawel Skrobanek, Marek Woda |
Analysis of Timing Requirements for Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DepCoS-RELCOMEX ![In: 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), June 14-16, 2007, Szklarska Poreba, Poland, pp. 278-285, 2007, IEEE Computer Society, 0-7695-2850-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Álvaro Herrero 0001, Emilio Corchado, Paolo Gastaldo, Davide Leoncini, Francesco Picasso, Rodolfo Zunino |
Intrusion Detection at Packet Level by Unsupervised Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2007, 8th International Conference, Birmingham, UK, December 16-19, 2007, Proceedings, pp. 718-727, 2007, Springer, 978-3-540-77225-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Auto Associative Back Propagation, Network Security, Self-Organizing Map, Intrusion Detection System, Vector Quantization |
Displaying result #601 - #700 of 2223 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|