The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for intrusion with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1991 (15) 1992-1994 (22) 1995-1996 (19) 1997 (21) 1998 (21) 1999 (101) 2000 (82) 2001 (116) 2002 (179) 2003 (304) 2004 (453) 2005 (612) 2006 (626) 2007 (603) 2008 (674) 2009 (552) 2010 (420) 2011 (377) 2012 (338) 2013 (307) 2014 (319) 2015 (323) 2016 (370) 2017 (441) 2018 (595) 2019 (702) 2020 (790) 2021 (953) 2022 (1105) 2023 (1303) 2024 (309)
Publication types (Num. hits)
article(5186) book(16) data(15) incollection(79) inproceedings(7542) phdthesis(194) proceedings(20)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3828 occurrences of 1280 keywords

Results
Found 13052 publication records. Showing 13052 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
28Vladimir Nikulin, Alexander J. Smola Parametric model-based clustering. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Abdelghani Bellaachia, Rajat Bhatt An enhanced stream mining approach for network anomaly detection. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Robert S. Lynch Jr., Peter K. Willett Utilizing unsupervised learning to cluster data in the Bayesian data reduction algorithm. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28David P. Benjamin, Ranjita Shankar-Iyer, Archana Perumal VMSoar: a cognitive agent for network security. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Holger Jaenisch, James W. Handley, Jeffrey P. Faucheux, Ken Lamkin Shai-Hulud: The quest for worm sign. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Chandra Pandey Deducing trapdoor primitives in public key encryption schemes. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Danzhou Liu, Charles E. Hughes Deducing behaviors from primitive movement attributes. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Dongming Cai, James Theiler, Maya B. Gokhale Detecting a malicious executable without prior knowledge of its patterns. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Jingtao Yao 0001 Knowledge extracted from trained neural networks: What's next? Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Rodolfo A. Fiorini, Gianfranco Dacquino Improved object optimal synthetic description, modeling, learning, and discrimination by GEOGINE computational kernel. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Shusaku Tsumoto, Shoji Hirano On statistical independence of a contingency matrix. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Kun Zhang 0012, Zujia Xu, Bill P. Buckles Oblique decision tree induction using multimembered evolution strategies. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Wei Xie, Feng Chu 0002, Lipo Wang, Eng Thiam Lim A fuzzy neural network for intelligent data processing. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Dipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran Efficient visualization of security events in a large agent society. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Raymond A. Cardillo, John J. Salerno The pearls of using real-world evidence to discover social groups. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Moises Sudit, Adam Stotz, Michael Holender Situational awareness of a coordinated cyber attack. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Martin R. Stytz, Sheila B. Banks Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Yu Liu, Hong Man Network vulnerability assessment using Bayesian networks. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Predrag Zivic Information risk and security modeling. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28John J. Salerno, Raymond A. Cardillo, Zhongfei (Mark) Zhang Comparing various algorithms for discovering social groups with uni-party data. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Shusaku Tsumoto Granularity and statistical independence in a contingency table. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Deyun Chen, Shujun Pei, Zhiying Quan Knowledge base system visualization reasoning model based on ICON. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Ching-Cheng Lee, Rashmi Prabhakara Web image retrieval using an effective topic and content-based technique. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Walker H. Land Jr., Mark J. Embrechts, Frances R. Anderson, Tom Smith, Lut Wong, Stephen Fahlbusch, Robert Choma Integrating knowledge representation/engineering, the multivariant PNN, and machine learning to improve breast cancer diagnosis. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Shoji Hirano, Shusaku Tsumoto Classification of temporal sequences using multiscale matching and rough clustering. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28David P. Benjamin, Adrian Walker Semantic encoding of relational databases in wireless networks. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Vivek Verma, Nikhil Gagvani Visualizing intelligence information using correlation graphs. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Yaping Deng, Wei Zhang A new method for MPLS-based recovery. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28James F. Smith III, ThanhVu H. Nguyen Data-mining-based automated reverse engineering and defect discovery. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Rashid Hafeez Khokhar, Mohd. Noor Md. Sap Predictive fuzzy reasoning method for time series stock market data mining. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Sheila B. Banks, Martin R. Stytz A taxonomy and discussion of software attack technologies. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Chapman Flack, Mikhail J. Atallah Better Logging through Formality. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF CIDF, reliability, interoperability, specification, documentation, grammar, formal, log, BSM
28Josué Kuri, Gonzalo Navarro 0001, Ludovic Mé, Laurent Heye A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28James Riordan, Dominique Alessandri Target Naming and Service Apoptosis. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28 Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, USA, April 9-12, 1999 Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
28 Recent Advances in Intrusion Detection, Second International Workshop, RAID 1999, West Lafayette, Indiana, USA, September 7-9, 1999. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Charles J. Antonelli, M. Undy, Peter Honeyman The Packet Vault: Secure Storage of Network Data. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
28Luc Girardin An Eye on Network Intruder-Administrator Shootouts. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
28R. Sekar 0001, Thomas F. Bowen, Mark E. Segal On Preventing Intrusions by Process Behavior Monitoring. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
28Roland Büschkes, Mark Borning, Dogan Kesdogan Transaction-based Anomaly Detection. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
28Peter G. Neumann, Phillip A. Porras Experience with EMERALD to Date. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
28John Green, David J. Marchette, Stephen Northcutt, Bill Ralph Analysis Techniques for Detecting Coordinated Attacks and Probes. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
28Daniel V. Klein Defending Against the Wily Surfer-Web-based Attacks and Defenses. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
28David J. Marchette A Statistical Method for Profiling Network Traffic. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
28Minaxi Gupta, Mani Subramanian Preprocessor Algorithm for Network Management Codebook. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
28Qianli Zhang, Xing Li Session State Transition Based Large Network IDS. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28John Kelsey, Bruce Schneier Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Glenn Mansfield Towards trapping wily intruders in the large. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Christina Yip Chung, Michael Gertz 0001, Karl N. Levitt Misuse Detection in Database Systems Through User Profiling. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Tim Farley Lessons Learned in Commercial IDS Development. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Christopher Wee Audit logs: to keep or not to keep? Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Stuart Staniford-Chen IDS Standards: Lessons Learned to Date. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Wenke Lee, Salvatore J. Stolfo Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Vern Paxson Defending against network IDS evasion. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28David W. Baker, Steven M. Christey, William H. Hill, David E. Mann The Development of a Common Vulnerability Enumeration. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Tiang Hwee Ong, Chung Pheng Tan, Yong Tai Tan, Christopher Ting SNMS - Shadow Network Management System. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Matt Bishop Vulnerability Analysis: An Extended Abstract. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Stefanos Manganaris, Marvin Christensen, Dan Zerkle, Keith Hermiz A Data Mining Analysis of RTID Alarms. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Jose Duarte de Queiroz, Luiz F. Rust da Costa Carmo, Luci Pirmez Micael: An Autonomous Mobile Agent System to Protect New Generation Networked Applications. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Aaron Schwartzbard, Anup K. Ghosh A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Eugene H. Spafford, Diego Zamboni New directions for the AAFID architecture. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Pars Mutaf Defending against a Denial-of-Service Attack on TCP. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 1999 DBLP  BibTeX  RDF
28Soo-Jin Park, Young-Shin Park, Yong-Rak Choi, Sukhoon Kang SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home Network. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Se-Yul Lee, Yong-Soo Kim, Bong-Hwan Lee, Sukhoon Kang, Chan-Hyun Youn A Probe Detection Model Using the Analysis of the Fuzzy Cognitive Maps. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Bharat B. Madan, Katerina Goseva-Popstojanova, Kalyanaraman Vaidyanathan, Kishor S. Trivedi Modeling and Quantification of Security Attributes of Software Systems. Search on Bibsonomy DSN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Ying Lin, Yan Zhang, Yang-jia Ou The Design and Implementation of Host-Based Intrusion Detection System. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF OSSEC, intrusion detection, intrusion detection system, BP neural network, Log analysis, HIDS
27Xiao-hui Zeng, Wen-lang Luo, Jin-tao Zeng, Yan-ping Chen, Shi-yao Jin Research on a High Efficient Intrusion Prevention Model. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF network security, distributed scheduling, intrusion prevention, network attack, network intrusion
27Mansour M. Alsulaiman, Aasem N. Alyahya, Raed A. Alkharboush, Nasser S. Alghafis Intrusion Detection System Using Self-Organizing Maps. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Detection system, hierarchical SOM, self organizing maps, Intrusion Detection system, Intrusion
27Gang Lu, Junkai Yi, Kevin Lü 0001 A dubiety-determining based model for database cumulated anomaly intrusion. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly intrusion, intrusion detection, database security
27Shiuh-Pyng Shieh, Virgil D. Gligor On a Pattern-Oriented Model for Intrusion Detection. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Access misuse, audit analysis, context-dependent intrusion, operational security problems, rule-based methods, intrusion detection, statistical methods, secure systems
26Wei Wang 0012, Thomas Guyet, Svein J. Knapskog Autonomic Intrusion Detection System. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Giorgos Vasiliadis, Michalis Polychronakis, Spyros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis Regular Expression Matching on Graphics Hardware for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matt Bishop Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Response Agent (RA), Topology Dependency Index (TDI), Attack Damage Index (ADI), adaptive isolation, attack damage, response cost, MANET
26José M. González, Vern Paxson Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Hervé Debar, Jouni Viinikka Intrusion Detection: Introduction to Intrusion Detection and Security Information Management. Search on Bibsonomy FOSAD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Herbert Bos, Kaiming Huang Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed firewall, network processors
26Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller Environment-Sensitive Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Ivan Balepin, Sergei Maltsev, Jeff Rowe, Karl N. Levitt Using Specification-Based Intrusion Detection for Automated Response. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008. Search on Bibsonomy Comput. Sci. Res. Dev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Measurement requirements, Intrusion detection, Situation awareness, Network monitoring, Early warning systems
26Feng Gu 0006, Julie Greensmith, Uwe Aickelin Integrating real-time analysis with the dendritic cell algorithm through segmentation. Search on Bibsonomy GECCO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF segementation, intrusion detection systems, real-time analysis, dendritic cell algorithm
26Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios Adaptabilty of a GP Based IDS on Wireless Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Networks, Genetic Programming, Intrusion Detection System, Denial of Service
26Luigi P. Cordella, Carlo Sansone A multi-stage classification system for detecting intrusions in computer networks. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Classification reliability, Network security, Intrusion detection systems, Multiple classifier systems, Reject option
26Anh-Quynh Nguyen, Yoshiyasu Takefuji A novel approach for a file-system integrity monitor tool of Xen virtual machine. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Xen virtual machine, intrusion detection, Linux, rootkit
26Seungyong Yoon, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang High Performance Session State Management Scheme for Stateful Packet Inspection. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Stateful Packet Inspection, High Performance Intrusion Detection
26Alexandre Schulter, Kleber Vieira, Carlos Becker Westphall, Carla Merkle Westphall Defending Grids Against Intrusions. Search on Bibsonomy IWSOS/EuroNGI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, intrusion detection, Computational grids
26David Duncombe, George M. Mohay, Andrew J. Clark Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF immunological., intrusion detection, alert correlation
26Rupinder Gill, Jason Smith 0001, Andrew J. Clark Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF session hi-jacking, wireless intrusion detection, round trip time, received signal strength, passive monitoring
26Sang-Kyun Noh, DongKook Kim, Yongmin Kim 0005, Bong-Nam Noh Modeling of Network Intrusions Based on the Multiple Transition Probability. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network-based intrusion detection, multiple transition probability, Ergodic model, probability-based modeling, likelihood measure
26Carrie Gates, Carol Taylor Challenging the anomaly detection paradigm: a provocative discussion. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, intrusion detection
26Yi Hu, Brajendra Panda Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Malicious transactions, intrusion detection, anomaly detection, data dependency
26Khin Mi Mi Aung, Kiejin Park, Jong Sou Park A Model of ITS Using Cold Standby Cluster. Search on Bibsonomy ICADL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Concepts and Models, Intrusion Tolerant System, Security, Cluster System, Rejuvenation
26Udo Payer, Peter Teufl, Mario Lamberger Hybrid Engine for Polymorphic Shellcode Detection. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF polymorphic shellcode detection, neural networks, Intrusion Detection
26Young H. Cho, William H. Mangione-Smith A pattern matching coprocessor for network security. Search on Bibsonomy DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security, pattern matching, intrusion, snort, pattern search
26Kirill Levchenko, Ramamohan Paturi, George Varghese On the difficulty of scalably detecting network attacks. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF communication complexity, network intrusion detection
26Stefan Axelsson Combining a bayesian classifier with visualisation: understanding the IDS. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF naive bayesian classification, intrusion detection
26Allen D. Malony, Sameer Shende Overhead Compensation in Performance Profiling. Search on Bibsonomy Euro-Par The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Performance measurement and analysis, overhead compensation, parallel computing, profiling, intrusion
26Eung Ki Park, Dae-Sik Choi, Eul-Gyu Im, Jung-Taek Seo, Dongkyu Kim Adaptive Architecture for Web Server Survivability. Search on Bibsonomy ADVIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF web services, survivability, intrusion tolerance
26Eung Ki Park, Dae-Sik Choi, Jung-Taek Seo, Choonsik Park, Dongkyu Kim Adaptation Enhanced Mechanism for Web Survivability. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF web services, survivability, intrusion tolerance
26Bo Sun 0001, Kui Wu 0001, Udo W. Pooch Alert aggregation in mobile ad hoc networks. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF alert aggregation, mobile ad hoc networks, intrusion detection, routing security
26Dae Hyun Yum, Pil Joong Lee Efficient Key Updating Signature Schemes Based on IBS. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key insulated signature, intrusion resilient siganture, identity based signature
Displaying result #601 - #700 of 13052 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license