|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 783 occurrences of 399 keywords
|
|
|
Results
Found 836 publication records. Showing 827 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
9 | Hiroaki Kikuchi, Naoya Fukuno, Masato Terada, Norihisa Doi |
Principal Components of Port-Address Matrices in Port-Scan Analysis. |
OTM Conferences (2) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Konrad Rieck, Stefan Wahl, Pavel Laskov, Peter Domschitz, Klaus-Robert Müller |
A Self-learning System for Detection of Anomalous SIP Messages. |
IPTComm |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Marc Lelarge, Jean Bolot |
Network externalities and the deployment of security features and protocols in the internet. |
SIGMETRICS |
2008 |
DBLP DOI BibTeX RDF |
security, game theory, economics, price of anarchy, epidemics, cascading |
9 | Thomas Panas |
Signature visualization of software binaries. |
SOFTVIS |
2008 |
DBLP DOI BibTeX RDF |
malware visualization, binary analysis |
9 | Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino |
Extracting Worm-Infected Hosts Using White List. |
SAINT |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Yu Zhang 0003, Tao Li, Jia Sun, Renchao Qin |
An FSM-Based Approach for Malicious Code Detection Using the Self-Relocation Gene. |
ICIC (1) |
2008 |
DBLP DOI BibTeX RDF |
self-relocation gene, finite-state machine, malicious code detection |
9 | Kandha Sankarpandian, Travis Little, W. Keith Edwards |
Talc: using desktop graffiti to fight software vulnerability. |
CHI |
2008 |
DBLP DOI BibTeX RDF |
usable security, internet security, software vulnerabilities, security framework, patch management, home users, graffiti |
9 | Chia-Tien Dan Lo, Yi-Gang Tai |
Highly Space Efficient Counters for Perl Compatible Regular Expressions in FPGAs. |
ARC |
2008 |
DBLP DOI BibTeX RDF |
|
9 | M. Zubair Shafiq, Muddassar Farooq, Syed Ali Khayam |
A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection. |
EvoWorkshops |
2008 |
DBLP DOI BibTeX RDF |
Information Theoretic Features, Portscan Detection, Neural Networks, Adaptive Neuro Fuzzy Inference System (ANFIS) |
9 | Tobias Eggendorfer |
Application Level Proxies on Bridges. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
Security, Network, Proxy, Bridge, Content Filter |
9 | Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell |
A Layered Architecture for Detecting Malicious Behaviors. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Dynamic, Malware, Behavior, Data-Flow, Semantic Gap |
9 | Milan Vojnovic, Varun Gupta, Thomas Karagiannis, Christos Gkantsidis |
Sampling Strategies for Epidemic-Style Information Dissemination. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Sirui Yang, Hai Jin 0001, Xiaofei Liao, Sanmin Liu |
Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
Rose Epidemic, Modeling, Social Network, Portable Device |
9 | Fabrizio Baiardi, Daniele Sgandurra |
Secure Sharing of an ICT Infrastructure through Vinci. (PDF / PS) |
AIMS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Ahmad Ghanbari, Ali Rostami, Sayyed Mohammad Reza Sayyed Noorani, Mir Masoud Seyyed Fakhrabadi |
Modeling and Simulation of Inchworm Mode Locomotion. |
ICIRA (1) |
2008 |
DBLP DOI BibTeX RDF |
Inchworm robot, Crawling locomotion, Simulation, Manipulator, Close loop, Trajectory generation |
9 | Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov |
Learning and Classification of Malware Behavior. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Ting-Fang Yen, Michael K. Reiter |
Traffic Aggregation for Malware Detection. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Narisa Zhao, Xianfeng Zhang |
The Worm Propagation Model and Control Strategy Based on Distributed Honeynet. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | M. Eric Johnson, Dan McGuire, Nicholas D. Willey |
The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Hao Tu, Zhitang Li, Bin Liu 0013 |
Mining Network Traffic for Worm Signature Extraction. |
FSKD (4) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera |
MAISim: mobile agent malware simulator. |
SimuTools |
2008 |
DBLP DOI BibTeX RDF |
computer attacks, security, simulation, mobile agents, malware, critical infrastructures, ACM proceedings |
9 | Xinghui Wang, Du Xu |
An Efficient Sequence Alignment Algorithm of Network Traffic. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Jan Tozicka, Stepán Urban, Magdalena Prokopová, Michal Pechoucek |
Filter Allocation Using Iterative ECNP. |
CIA |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Sirui Yang, Hai Jin 0001, Bo Li 0001, Xiaofei Liao, Hong Yao, Xuping Tu |
The Content Pollution in Peer-to-Peer Live Streaming Systems: Analysis and Implications. |
ICPP |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Huidong Jin 0001, Olivier Y. de Vel, Ke Zhang, Nianjun Liu |
Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks. |
Australasian Conference on Artificial Intelligence |
2008 |
DBLP DOI BibTeX RDF |
density-based cluster visualisation, honeypot data, Knowledge discovery, outlier detection, botnet, Internet security |
9 | Ramana Rao Kompella, Sumeet Singh, George Varghese |
On scalable attack detection in the network. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
data structures, denial of service, routers, scanning, streaming algorithms, network attacks, syn flooding |
9 | Gianni La Spina, Michael Sfakiotakis, Dimitris P. Tsakiris, Arianna Menciassi, Paolo Dario |
Polychaete-Like Undulatory Robotic Locomotion in Unstructured Substrates. |
IEEE Trans. Robotics |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Gary McGraw |
Silver Bullet Talks with Mikko Hypponen [Interview]. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos |
A spatial stochastic model for worm propagation: scale effects. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Vinoo Thomas, Nitin Jyoti |
Bot countermeasures. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Radu State, Olivier Festor |
Malware: a future framework for device, network and service management. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Attila Ondi, Richard Ford |
How good is good enough? Metrics for worm/anti-worm evaluation. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Chunhe Xia, Yunping Shi, Xiaojian Li, Wei Gao |
P2P worm detection based on application identification. |
Frontiers Comput. Sci. China |
2007 |
DBLP DOI BibTeX RDF |
P2P worm, worm detection, application identification |
9 | Ram Dantu, João W. Cangussu, Sudeep Patwardhan |
Fast Worm Containment Using Feedback Control. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
general, network-level security and protection, Computer systems organization, computer systems organization, process control systems, special-purpose and application-based systems, communication/networking and information technology |
9 | Chenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie |
Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection. |
Integrated Network Management |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Gerhard Münz, Georg Carle |
Real-time Analysis of Flow Data for Network Attack Detection. |
Integrated Network Management |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Tyrone Tai-On Kwok, Yu-Kwong Kwok |
Design and Evaluation of Parallel String Matching Algorithms for Network Intrusion Detection Systems. |
NPC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas W. Hengartner, Stephan J. Eidenbenz, Vincent Q. Vu |
Bluetooth worm propagation: mobility pattern matters! |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 |
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
memory corruption, debugging, vulnerability analysis |
9 | Miroslav Ponec, Paul Giura, Hervé Brönnimann, Joel Wein |
Highly efficient techniques for network forensics. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
payload attribution, bloom filter, network forensics |
9 | Michael Sfakiotakis, Dimitris P. Tsakiris, Kostas Karakasiliotis |
Polychaete-like Pedundulatory Robotic Locomotion. |
ICRA |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jean-Jacques Quisquater |
The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults? |
SSS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Yang Xiang, Qiang Li 0008 |
Online Tracing Scanning Worm with Sliding Window. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Propagation path, Online tracing, Detection window, Worm |
9 | Hanchuan Peng, Fuhui Long, Eugene W. Myers |
Straightening Worm Images. |
ISBI |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jayamsakthi Shanmugam, M. Ponnavaikko |
A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented Architecture. |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
Application-level web Security, cross-site scripting, security vulnerabilities |
9 | Trevor Jim, Nikhil Swamy, Michael Hicks 0001 |
Defeating script injection attacks with browser-enforced embedded policies. |
WWW |
2007 |
DBLP DOI BibTeX RDF |
script injection, cross-site scripting, web application security |
9 | Leon Moonen, Spiros Mancoridis |
International Workshop on Code Based Software Security Assessments - CoBaSSA 2007. |
WCRE |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Sangjin Kim, Changyong Lee, Daeyoung Kim 0004, Heekuck Oh |
A Practical Way to Provide Perfect Forward Secrecy for Secure E-Mail Protocols. |
ICDCIT |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jintao Xiong |
PID: A Queue Management Scheme for Improving Network Resilience Under Worm Attacks. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jun Li 0001, Dejing Dou, Shiwoong Kim, Han Qin, Yibo Wang |
On Knowledge-Based Classification of Abnormal BGP Events. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Bing Wu, Xiao-chun Yun, Xiang Cui |
Study on Worm Poisoning Technology. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Like Zhang, Gregory B. White |
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Tutomu Murase, Hiroki Fujiwara, Yukinobu Fukushima, Masayoshi Kobayashi, Tokumi Yokohira |
Performance Evaluation of a Multi-Stage Network Event Detection Scheme for Decreasing the False-Positive Rate for a Large Number of Simultaneous, Unknown Events. |
ICN |
2007 |
DBLP DOI BibTeX RDF |
Multi-Stage Network Anomaly Detection, Change-Point Detection, Large-Scale Simultaneous Event, Worm, Virus |
9 | M. Patrick Collins, Michael K. Reiter |
Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Anomaly detection, Graph analysis, Large networks |
9 | Jérôme François, Radu State, Olivier Festor |
Malware Models for Network and Service Management. (PDF / PS) |
AIMS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jan Goebel, Thorsten Holz, Carsten Willems |
Measurement and Analysis of Autonomous Spreading Malware in a University Environment. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
Malware, Honeypots, Invasive Software |
9 | Jon B. Weissman, Vipin Kumar 0001, Varun Chandola, Eric Eilertson, Levent Ertöz, György J. Simon, Seonho Kim, Jinoh Kim |
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing. |
International Conference on Computational Science (1) |
2007 |
DBLP DOI BibTeX RDF |
Data mining, Grid Computing |
9 | George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk |
An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). |
PM2HW2N |
2007 |
DBLP DOI BibTeX RDF |
handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes |
9 | Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda |
Design Issues of an Isolated Sandbox Used to Analyze Malwares. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Like Zhang, Gregory B. White |
Analysis of Payload Based Application level Network Anomaly Detection. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, Edwin Hsing-Mean Sha |
Parallel Network Intrusion Detection on Reconfigurable Platforms. |
EUC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Andreas Holzer, Johannes Kinder, Helmut Veith |
Using Verification Technology to Specify and Detect Malware. |
EUROCAST |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Insu Kim, Keecheon Kim |
Secure Session Management Mechanism in VoIP Service. |
ISPA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion |
A Classification of Viruses Through Recursion Theorems. |
CiE |
2007 |
DBLP DOI BibTeX RDF |
iteration theorem, polymorphism, propagation, Computer viruses, recursion theorem |
9 | Rui Joaquim, Carlos Ribeiro |
CodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment. |
VOTE-ID |
2007 |
DBLP DOI BibTeX RDF |
vote manipulation, Internet voting |
9 | Young-Gab Kim, Jongin Lim 0001 |
HMM-Based Approach for Evaluating Risk Propagation. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase |
A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Geon Woo Kim 0001, Deok-Gyu Lee, Jong Wook Han, Sang-Choon Kim, Sang Wook Kim |
Security Framework for Home Network: Authentication, Authorization, and Security Policy. |
PAKDD Workshops |
2007 |
DBLP DOI BibTeX RDF |
Security, Authentication, Access Control, Authorization, Security Policy, Home Network |
9 | John Leslie King |
Dig the Dirt. (PDF / PS) |
Virtuality and Virtualization |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu |
How to Secure Your Email Address Book and Beyond. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
self-spreading malicious emails, self-replicating malicious emails, email address book, encryption |
9 | Thomas Gamer, Michael Scharf, Marcus Schöller |
Collaborative Anomaly-Based Attack Detection. |
IWSOS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Srivaths Ravi 0001, Stefan Mangard |
Tutorial T1: Designing Secure SoCs. |
VLSI Design |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Lien Deboosere, J. De Wachter, Pieter Simoens, Filip De Turck, Bart Dhoedt, Piet Demeester |
Thin Client Computing Solutions in Low- and High-Motion Scenarios. |
ICNS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Yu Jin 0001, Zhi-Li Zhang, Kuai Xu, Feng Cao, Sambit Sahu |
Identifying and tracking suspicious activities through IP gray space analysis. |
MineNet |
2007 |
DBLP DOI BibTeX RDF |
IP gray space, entropy, anomaly detection, profiling, network traffic analysis |
9 | Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou |
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
Intrusion Detection Systems, Malware, Honeypots |
9 | Xian Xu 0001 |
P Systems and Finite Automata. |
CISIS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Zhuowei Li 0001, Amitabha Das, Jianying Zhou 0001 |
Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. |
TrustBus |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Yu-Chin Cheng, Chien-Hung Chen, Chung-Chih Chiang, Jun-Wei Wang 0002, Chi-Sung Laih |
Generating Attack Scenarios with Causal Relationship. |
GrC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Bradley K. Jensen, Melinda Cline, Carl Stephen Guynes |
Teaching the undergraduate CS Information Security Course. |
ACM SIGCSE Bull. |
2006 |
DBLP DOI BibTeX RDF |
teaching information security, intrusion detection, malware, information assurance |
9 | Jisheng Wang, David J. Miller 0001, George Kesidis |
Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Phillip A. Porras |
Privacy-Enabled Global Threat Monitoring. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Hong Yan 0002, Hui Zhang 0001, Kunwadee Sripanidkulchai, Zon-Yin Shae, Debanjan Saha |
Information leak vulnerabilities in SIP implementations. |
IEEE Netw. |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei |
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. |
DSN |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Evan Cooke, Zhuoqing Morley Mao, Farnam Jahanian |
Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware. |
DSN |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Vyas Sekar, Yinglian Xie, Michael K. Reiter, Hui Zhang 0001 |
A Multi-Resolution Approach for Worm Detection and Containment. |
DSN |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Bo Zhu, Sanjeev Setia, Sushil Jajodia |
Providing witness anonymity in peer-to-peer systems. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
k-times, witness anonymity, privacy, peer-to-peer systems, anonymous authentication |
9 | Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah, William M. Pottenger |
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis. |
ICDM |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Thomas W. Reps, Gogul Balakrishnan, Junghee Lim |
Intermediate-representation recovery from low-level code. |
PEPM |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Jan Camenisch |
Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Simon P. Chung, Aloysius K. Mok |
The LAIDS/LIDS Framework for Systematic IPS Design. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Minho Sung, Abhishek Kumar 0003, Li (Erran) Li, Jia Wang 0001, Jun (Jim) Xu |
Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic. |
ICDE Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
9 | David Haussler |
Ultraconserved Elements, Living Fossil Transposons, and Rapid Bursts of Change: Reconstructing the Uneven Evolutionary History of the Human Genome. |
RECOMB |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Khadija Houerbi Ramah, Hichem Ayari, Farouk Kamoun |
Traffic Anomaly Detection and Characterization in the Tunisian National University Network. |
Networking |
2006 |
DBLP DOI BibTeX RDF |
Temporal Characteristics, Principal Component Analysis, Anomaly Detection |
9 | Gene Myers |
Imaging-Based Systems Biology. |
HiPC |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Michael Jarrett, Rudolph E. Seviora |
Diversity to Enhance Autonomic Computing Self-Protection. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Leon Moonen, Spiros Mancoridis |
Code Based Software Security Assessments. |
WCRE |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Thodoros Komninos, Yannis C. Stamatiou, G. Vavitsas |
A Worm Propagation Model Based on People's Email Acquaintance Profiles. |
WINE |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Moez Draief, Ayalvadi J. Ganesh, Laurent Massoulié |
Thresholds for virus spread on networks. |
VALUETOOLS |
2006 |
DBLP DOI BibTeX RDF |
SIR epidemic, largest connected component, random graphs, spectral radius |
9 | Carrie Gates, Joshua J. McNutt, Joseph B. Kadane, Marc I. Kellner |
Scan Detection on Very Large Networks Using Logistic Regression Modeling. |
ISCC |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Simon P. Chung, Aloysius K. Mok |
Allergy Attack Against Automatic Signature Generation. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
Automatic Signature Generation, Adaptive Response, Intrusion Prevention |
Displaying result #601 - #700 of 827 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|