|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3828 occurrences of 1280 keywords
|
|
|
Results
Found 13052 publication records. Showing 13052 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Vladimir Nikulin, Alexander J. Smola |
Parametric model-based clustering. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Abdelghani Bellaachia, Rajat Bhatt |
An enhanced stream mining approach for network anomaly detection. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Robert S. Lynch Jr., Peter K. Willett |
Utilizing unsupervised learning to cluster data in the Bayesian data reduction algorithm. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | David P. Benjamin, Ranjita Shankar-Iyer, Archana Perumal |
VMSoar: a cognitive agent for network security. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Holger Jaenisch, James W. Handley, Jeffrey P. Faucheux, Ken Lamkin |
Shai-Hulud: The quest for worm sign. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Chandra Pandey |
Deducing trapdoor primitives in public key encryption schemes. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Danzhou Liu, Charles E. Hughes |
Deducing behaviors from primitive movement attributes. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Dongming Cai, James Theiler, Maya B. Gokhale |
Detecting a malicious executable without prior knowledge of its patterns. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Jingtao Yao 0001 |
Knowledge extracted from trained neural networks: What's next? |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Rodolfo A. Fiorini, Gianfranco Dacquino |
Improved object optimal synthetic description, modeling, learning, and discrimination by GEOGINE computational kernel. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Shusaku Tsumoto, Shoji Hirano |
On statistical independence of a contingency matrix. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Kun Zhang 0012, Zujia Xu, Bill P. Buckles |
Oblique decision tree induction using multimembered evolution strategies. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Wei Xie, Feng Chu 0002, Lipo Wang, Eng Thiam Lim |
A fuzzy neural network for intelligent data processing. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Dipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran |
Efficient visualization of security events in a large agent society. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Raymond A. Cardillo, John J. Salerno |
The pearls of using real-world evidence to discover social groups. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Moises Sudit, Adam Stotz, Michael Holender |
Situational awareness of a coordinated cyber attack. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Martin R. Stytz, Sheila B. Banks |
Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Yu Liu, Hong Man |
Network vulnerability assessment using Bayesian networks. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Predrag Zivic |
Information risk and security modeling. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | John J. Salerno, Raymond A. Cardillo, Zhongfei (Mark) Zhang |
Comparing various algorithms for discovering social groups with uni-party data. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Shusaku Tsumoto |
Granularity and statistical independence in a contingency table. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Deyun Chen, Shujun Pei, Zhiying Quan |
Knowledge base system visualization reasoning model based on ICON. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Ching-Cheng Lee, Rashmi Prabhakara |
Web image retrieval using an effective topic and content-based technique. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Walker H. Land Jr., Mark J. Embrechts, Frances R. Anderson, Tom Smith, Lut Wong, Stephen Fahlbusch, Robert Choma |
Integrating knowledge representation/engineering, the multivariant PNN, and machine learning to improve breast cancer diagnosis. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Shoji Hirano, Shusaku Tsumoto |
Classification of temporal sequences using multiscale matching and rough clustering. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | David P. Benjamin, Adrian Walker |
Semantic encoding of relational databases in wireless networks. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Vivek Verma, Nikhil Gagvani |
Visualizing intelligence information using correlation graphs. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Yaping Deng, Wei Zhang |
A new method for MPLS-based recovery. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | James F. Smith III, ThanhVu H. Nguyen |
Data-mining-based automated reverse engineering and defect discovery. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Rashid Hafeez Khokhar, Mohd. Noor Md. Sap |
Predictive fuzzy reasoning method for time series stock market data mining. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Sheila B. Banks, Martin R. Stytz |
A taxonomy and discussion of software attack technologies. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Chapman Flack, Mikhail J. Atallah |
Better Logging through Formality. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
CIDF, reliability, interoperability, specification, documentation, grammar, formal, log, BSM |
28 | Josué Kuri, Gonzalo Navarro 0001, Ludovic Mé, Laurent Heye |
A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
|
28 | James Riordan, Dominique Alessandri |
Target Naming and Service Apoptosis. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
|
28 | |
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, USA, April 9-12, 1999 |
Workshop on Intrusion Detection and Network Monitoring |
1999 |
DBLP BibTeX RDF |
|
28 | |
Recent Advances in Intrusion Detection, Second International Workshop, RAID 1999, West Lafayette, Indiana, USA, September 7-9, 1999. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Charles J. Antonelli, M. Undy, Peter Honeyman |
The Packet Vault: Secure Storage of Network Data. |
Workshop on Intrusion Detection and Network Monitoring |
1999 |
DBLP BibTeX RDF |
|
28 | Luc Girardin |
An Eye on Network Intruder-Administrator Shootouts. |
Workshop on Intrusion Detection and Network Monitoring |
1999 |
DBLP BibTeX RDF |
|
28 | R. Sekar 0001, Thomas F. Bowen, Mark E. Segal |
On Preventing Intrusions by Process Behavior Monitoring. |
Workshop on Intrusion Detection and Network Monitoring |
1999 |
DBLP BibTeX RDF |
|
28 | Roland Büschkes, Mark Borning, Dogan Kesdogan |
Transaction-based Anomaly Detection. |
Workshop on Intrusion Detection and Network Monitoring |
1999 |
DBLP BibTeX RDF |
|
28 | Peter G. Neumann, Phillip A. Porras |
Experience with EMERALD to Date. |
Workshop on Intrusion Detection and Network Monitoring |
1999 |
DBLP BibTeX RDF |
|
28 | John Green, David J. Marchette, Stephen Northcutt, Bill Ralph |
Analysis Techniques for Detecting Coordinated Attacks and Probes. |
Workshop on Intrusion Detection and Network Monitoring |
1999 |
DBLP BibTeX RDF |
|
28 | Daniel V. Klein |
Defending Against the Wily Surfer-Web-based Attacks and Defenses. |
Workshop on Intrusion Detection and Network Monitoring |
1999 |
DBLP BibTeX RDF |
|
28 | David J. Marchette |
A Statistical Method for Profiling Network Traffic. |
Workshop on Intrusion Detection and Network Monitoring |
1999 |
DBLP BibTeX RDF |
|
28 | Minaxi Gupta, Mani Subramanian |
Preprocessor Algorithm for Network Management Codebook. |
Workshop on Intrusion Detection and Network Monitoring |
1999 |
DBLP BibTeX RDF |
|
28 | Qianli Zhang, Xing Li |
Session State Transition Based Large Network IDS. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | John Kelsey, Bruce Schneier |
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Glenn Mansfield |
Towards trapping wily intruders in the large. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Christina Yip Chung, Michael Gertz 0001, Karl N. Levitt |
Misuse Detection in Database Systems Through User Profiling. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Tim Farley |
Lessons Learned in Commercial IDS Development. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Christopher Wee |
Audit logs: to keep or not to keep? |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Stuart Staniford-Chen |
IDS Standards: Lessons Learned to Date. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Wenke Lee, Salvatore J. Stolfo |
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Vern Paxson |
Defending against network IDS evasion. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | David W. Baker, Steven M. Christey, William H. Hill, David E. Mann |
The Development of a Common Vulnerability Enumeration. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Tiang Hwee Ong, Chung Pheng Tan, Yong Tai Tan, Christopher Ting |
SNMS - Shadow Network Management System. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Matt Bishop |
Vulnerability Analysis: An Extended Abstract. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Stefanos Manganaris, Marvin Christensen, Dan Zerkle, Keith Hermiz |
A Data Mining Analysis of RTID Alarms. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Jose Duarte de Queiroz, Luiz F. Rust da Costa Carmo, Luci Pirmez |
Micael: An Autonomous Mobile Agent System to Protect New Generation Networked Applications. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Aaron Schwartzbard, Anup K. Ghosh |
A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Eugene H. Spafford, Diego Zamboni |
New directions for the AAFID architecture. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Pars Mutaf |
Defending against a Denial-of-Service Attack on TCP. |
Recent Advances in Intrusion Detection |
1999 |
DBLP BibTeX RDF |
|
28 | Soo-Jin Park, Young-Shin Park, Yong-Rak Choi, Sukhoon Kang |
SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home Network. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Se-Yul Lee, Yong-Soo Kim, Bong-Hwan Lee, Sukhoon Kang, Chan-Hyun Youn |
A Probe Detection Model Using the Analysis of the Fuzzy Cognitive Maps. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Bharat B. Madan, Katerina Goseva-Popstojanova, Kalyanaraman Vaidyanathan, Kishor S. Trivedi |
Modeling and Quantification of Security Attributes of Software Systems. |
DSN |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Ying Lin, Yan Zhang, Yang-jia Ou |
The Design and Implementation of Host-Based Intrusion Detection System. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
OSSEC, intrusion detection, intrusion detection system, BP neural network, Log analysis, HIDS |
27 | Xiao-hui Zeng, Wen-lang Luo, Jin-tao Zeng, Yan-ping Chen, Shi-yao Jin |
Research on a High Efficient Intrusion Prevention Model. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
network security, distributed scheduling, intrusion prevention, network attack, network intrusion |
27 | Mansour M. Alsulaiman, Aasem N. Alyahya, Raed A. Alkharboush, Nasser S. Alghafis |
Intrusion Detection System Using Self-Organizing Maps. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
Detection system, hierarchical SOM, self organizing maps, Intrusion Detection system, Intrusion |
27 | Gang Lu, Junkai Yi, Kevin Lü 0001 |
A dubiety-determining based model for database cumulated anomaly intrusion. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
anomaly intrusion, intrusion detection, database security |
27 | Shiuh-Pyng Shieh, Virgil D. Gligor |
On a Pattern-Oriented Model for Intrusion Detection. |
IEEE Trans. Knowl. Data Eng. |
1997 |
DBLP DOI BibTeX RDF |
Access misuse, audit analysis, context-dependent intrusion, operational security problems, rule-based methods, intrusion detection, statistical methods, secure systems |
26 | Wei Wang 0012, Thomas Guyet, Svein J. Knapskog |
Autonomic Intrusion Detection System. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Giorgos Vasiliadis, Michalis Polychronakis, Spyros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis |
Regular Expression Matching on Graphics Hardware for Intrusion Detection. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matt Bishop |
Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Response Agent (RA), Topology Dependency Index (TDI), Attack Damage Index (ADI), adaptive isolation, attack damage, response cost, MANET |
26 | José M. González, Vern Paxson |
Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Hervé Debar, Jouni Viinikka |
Intrusion Detection: Introduction to Intrusion Detection and Security Information Management. |
FOSAD |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Herbert Bos, Kaiming Huang |
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
distributed firewall, network processors |
26 | Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller |
Environment-Sensitive Intrusion Detection. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Ivan Balepin, Sergei Maltsev, Jeff Rowe, Karl N. Levitt |
Using Specification-Based Intrusion Detection for Automated Response. |
RAID |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov |
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008. |
Comput. Sci. Res. Dev. |
2009 |
DBLP DOI BibTeX RDF |
Measurement requirements, Intrusion detection, Situation awareness, Network monitoring, Early warning systems |
26 | Feng Gu 0006, Julie Greensmith, Uwe Aickelin |
Integrating real-time analysis with the dendritic cell algorithm through segmentation. |
GECCO |
2009 |
DBLP DOI BibTeX RDF |
segementation, intrusion detection systems, real-time analysis, dendritic cell algorithm |
26 | Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios |
Adaptabilty of a GP Based IDS on Wireless Networks. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Wireless Networks, Genetic Programming, Intrusion Detection System, Denial of Service |
26 | Luigi P. Cordella, Carlo Sansone |
A multi-stage classification system for detecting intrusions in computer networks. |
Pattern Anal. Appl. |
2007 |
DBLP DOI BibTeX RDF |
Classification reliability, Network security, Intrusion detection systems, Multiple classifier systems, Reject option |
26 | Anh-Quynh Nguyen, Yoshiyasu Takefuji |
A novel approach for a file-system integrity monitor tool of Xen virtual machine. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
Xen virtual machine, intrusion detection, Linux, rootkit |
26 | Seungyong Yoon, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang |
High Performance Session State Management Scheme for Stateful Packet Inspection. |
APNOMS |
2007 |
DBLP DOI BibTeX RDF |
Stateful Packet Inspection, High Performance Intrusion Detection |
26 | Alexandre Schulter, Kleber Vieira, Carlos Becker Westphall, Carla Merkle Westphall |
Defending Grids Against Intrusions. |
IWSOS/EuroNGI |
2006 |
DBLP DOI BibTeX RDF |
security, intrusion detection, Computational grids |
26 | David Duncombe, George M. Mohay, Andrew J. Clark |
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. |
ACSW |
2006 |
DBLP BibTeX RDF |
immunological., intrusion detection, alert correlation |
26 | Rupinder Gill, Jason Smith 0001, Andrew J. Clark |
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. |
ACSW |
2006 |
DBLP BibTeX RDF |
session hi-jacking, wireless intrusion detection, round trip time, received signal strength, passive monitoring |
26 | Sang-Kyun Noh, DongKook Kim, Yongmin Kim 0005, Bong-Nam Noh |
Modeling of Network Intrusions Based on the Multiple Transition Probability. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
Network-based intrusion detection, multiple transition probability, Ergodic model, probability-based modeling, likelihood measure |
26 | Carrie Gates, Carol Taylor |
Challenging the anomaly detection paradigm: a provocative discussion. |
NSPW |
2006 |
DBLP DOI BibTeX RDF |
security, intrusion detection |
26 | Yi Hu, Brajendra Panda |
Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. |
J. Netw. Syst. Manag. |
2005 |
DBLP DOI BibTeX RDF |
Malicious transactions, intrusion detection, anomaly detection, data dependency |
26 | Khin Mi Mi Aung, Kiejin Park, Jong Sou Park |
A Model of ITS Using Cold Standby Cluster. |
ICADL |
2005 |
DBLP DOI BibTeX RDF |
Concepts and Models, Intrusion Tolerant System, Security, Cluster System, Rejuvenation |
26 | Udo Payer, Peter Teufl, Mario Lamberger |
Hybrid Engine for Polymorphic Shellcode Detection. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
polymorphic shellcode detection, neural networks, Intrusion Detection |
26 | Young H. Cho, William H. Mangione-Smith |
A pattern matching coprocessor for network security. |
DAC |
2005 |
DBLP DOI BibTeX RDF |
network security, pattern matching, intrusion, snort, pattern search |
26 | Kirill Levchenko, Ramamohan Paturi, George Varghese |
On the difficulty of scalably detecting network attacks. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
communication complexity, network intrusion detection |
26 | Stefan Axelsson |
Combining a bayesian classifier with visualisation: understanding the IDS. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
naive bayesian classification, intrusion detection |
26 | Allen D. Malony, Sameer Shende |
Overhead Compensation in Performance Profiling. |
Euro-Par |
2004 |
DBLP DOI BibTeX RDF |
Performance measurement and analysis, overhead compensation, parallel computing, profiling, intrusion |
26 | Eung Ki Park, Dae-Sik Choi, Eul-Gyu Im, Jung-Taek Seo, Dongkyu Kim |
Adaptive Architecture for Web Server Survivability. |
ADVIS |
2004 |
DBLP DOI BibTeX RDF |
web services, survivability, intrusion tolerance |
26 | Eung Ki Park, Dae-Sik Choi, Jung-Taek Seo, Choonsik Park, Dongkyu Kim |
Adaptation Enhanced Mechanism for Web Survivability. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
web services, survivability, intrusion tolerance |
26 | Bo Sun 0001, Kui Wu 0001, Udo W. Pooch |
Alert aggregation in mobile ad hoc networks. |
Workshop on Wireless Security |
2003 |
DBLP DOI BibTeX RDF |
alert aggregation, mobile ad hoc networks, intrusion detection, routing security |
26 | Dae Hyun Yum, Pil Joong Lee |
Efficient Key Updating Signature Schemes Based on IBS. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
Key insulated signature, intrusion resilient siganture, identity based signature |
Displaying result #601 - #700 of 13052 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|