The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for IDS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1992 (34) 1993-1994 (22) 1995-1996 (22) 1997-1999 (16) 2000 (17) 2001 (26) 2002 (42) 2003 (49) 2004 (84) 2005 (143) 2006 (162) 2007 (158) 2008 (145) 2009 (120) 2010 (55) 2011 (28) 2012 (41) 2013 (41) 2014 (32) 2015 (36) 2016 (99) 2017 (28) 2018 (106) 2019 (114) 2020 (116) 2021 (110) 2022 (158) 2023 (173) 2024 (46)
Publication types (Num. hits)
article(491) book(2) data(3) incollection(6) inproceedings(1707) phdthesis(4) proceedings(10)
Venues (Conferences, Journals, ...)
BigDataSecurity/HPSC/IDS(307) CoRR(88) IDS(63) BigDataSecurity(36) IEEE Access(29) RAID(27) Comput. Secur.(16) ACSAC(15) AINA(14) IWCMC(14) ICC(13) ISI(13) Recent Advances in Intrusion D...(12) SAINT(10) Sensors(10) ARES(9) More (+10 of total 934)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1161 occurrences of 620 keywords

Results
Found 2227 publication records. Showing 2223 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Marc Langheinrich, Remo Marti RFID Privacy Using Spatially Distributed Shared Secrets. Search on Bibsonomy UCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Kai Ouyang, Xiaowen Chu 0001, Lijun Dong, Hengqing Wang, Ting Cai MLCC: A Multi Layered Correlative Control Mechanism for the VPN Topology. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Michael E. Kuhl, Jason Kistner, Kevin Costantini, Moises Sudit Cyber attack modeling and simulation for network security analysis. Search on Bibsonomy WSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16A. B. Meijer A Methodology for Automated Extraction of the Optimal Pathways from Influence Diagrams. Search on Bibsonomy AIME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Michela Becchi, Patrick Crowley A hybrid finite automaton for practical deep packet inspection. Search on Bibsonomy CoNEXT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF regular expressions, DFA, deep packet inspection, NFA
16Yousra Alkabani, Farinaz Koushanfar, Miodrag Potkonjak Remote activation of ICs for piracy prevention and digital right management. Search on Bibsonomy ICCAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Kenneth L. Ingham, Hajime Inoue Comparing Anomaly Detection Techniques for HTTP. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hypertext transport protocol, Intrusion detection, Anomaly detection, HTTP, Comparison
16Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers Alert Verification Evasion Through Server Response Forging. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Alert Verification, Network Intrusion Detection, Exploits, Evasion
16Frédéric Massicotte, Mathieu Couture, Lionel C. Briand, Yvan Labiche Model-Driven, Network-Context Sensitive Intrusion Detection. Search on Bibsonomy MoDELS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF OCL constraints, Intrusion Detection, UML modeling
16Dong Li, Zhitang Li, Li Wang 0015 Reducing False Positives Based on Time Sequence Analysis. Search on Bibsonomy FSKD (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF feature selection, intrusion detection, rough set, particle swarm optimization
16Emmanuel Hooper An Intelligent Intrusion Detection and Response System Using Hybrid Ward Hierarchical Clustering Analysis. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Emmanuel Hooper An Intelligent Intrusion Detection and Response System Using Network Quarantine Channels: Firewalls and Packet Filters. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Patrick D. McDaniel Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed A Framework for an Adaptive Intrusion Detection System using Bayesian Network. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Grzegorz Kolaczek Multiagent Approach to Network Traffic Anomalies Uncertainty Level Assessment in Distributed Intrusion Detection System. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Bernard Haasdonk, Hans Burkhardt Classification with Invariant Distance Substitution Kernels. Search on Bibsonomy GfKl The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Jonathan Rabin, Onn Shehory Theoretically Founded Optimization of Auctioneer's Revenues in Expanding Auctions. Search on Bibsonomy AMEC/TADA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Koji Nakano Randomized Initialization on the 1-Dimensional Reconfigurable Mesh. Search on Bibsonomy PDCAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 IDGraphs: Intrusion Detection and Analysis Using Stream Compositing. Search on Bibsonomy IEEE Computer Graphics and Applications The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Brushing and Linking, Intrusion Detection, Interactive System, Dynamic Query, Security Visualization, Correlation Matrix
16Anoop Singhal, Sushil Jajodia Data warehousing and data mining techniques for intrusion detection systems. Search on Bibsonomy Distributed Parallel Databases The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data mining and analysis, Intrusion detection, Data warehouse, OLAP, Computer security
16Xiaoyun Hui, Guoren Wang, Huan Huo, Chuan Xiao 0001, Rui Zhou 0001 Region-Based Coding for Queries over Streamed XML Fragments. Search on Bibsonomy WISE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Wei Zhang 0005, Shaohua Teng, Xiufen Fu, Lin Wang 0010 Research on Communication Mechanism among Cooperating Multi-Intrusion Detection Agents. Search on Bibsonomy IEEE ICCI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Gaeil An, Joon S. Park Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attack Response, Quality of Service, Network Security, Packet Marking, Denial of Service Attack
16Emmanuel Hooper An Intelligent Detection and Response Strategy to False Positives and Network Attacks. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16William D. Gropp, Rajeev Thakur Issues in Developing a Thread-Safe MPI Implementation. Search on Bibsonomy PVM/MPI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Gianni Tedesco, Jamie Twycross, Uwe Aickelin Integrating Innate and Adaptive Immunity for Intrusion Detection. Search on Bibsonomy ICARIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Innate Immunity, Intrusion Detection, Dendritic Cells
16Naval Bhandari, Anirudha Sahoo, Sridhar Iyer Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Fahimeh Raja, Mostafa Keikha, Maseud Rahgozar, Farhad Oroumchian Using Rich Document Representation in XML Information Retrieval. Search on Bibsonomy INEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Rich Document Representation, XML Information Retrieval
16Adebayo O. Adetunmbi, Zhiwei Shi, Zhongzhi Shi, Olumide S. Adewale Network Anomalous Intrusion Detection using Fuzzy-Bayes. Search on Bibsonomy Intelligent Information Processing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF naïve-Bayes, intrusion detection, fuzzy
16Koichi Kise, Tomohiro Nakai, Masakazu Iwamura, Satoshi Yokota Efficient Recognition of Planar Objects Based on Hashing of Keypoints - An Approach Towards Making the Physical World Clickable. Search on Bibsonomy ICPR (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Zeng-Quan Wang, Hui-qiang Wang, Rui-jie Zhang Research and Design on Intelligent Agent Intrusion Response System. Search on Bibsonomy CIMCA/IAWTIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Angel Grediaga Olivo, Francisco Ibarra, Federico García, Bernardo Ledesma Latorre, Francisco Brotóns Application of Neural Networks in Network Control and Information Security. Search on Bibsonomy ISNN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF self organizative map, neural networks, intrusion detection system, perceptron
16Xiaotao Wei, Houkuan Huang, Shengfeng Tian A Modified RBF Neural Network for Network Anomaly Detection. Search on Bibsonomy ISNN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Yuehui Chen, Yong Zhang, Ajith Abraham Estimation of Distribution Algorithm for Optimization of Neural Networks for Intrusion Detection System. Search on Bibsonomy ICAISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Hee Suk Seo, Taekyung Kim, Hyungjong Kim 0002 Modeling of Distributed Intrusion Detection Using Fuzzy System. Search on Bibsonomy ICIC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jun Qian, Chao Xu, Meilin Shi Redesign and Implementation of Evaluation Dataset for Intrusion Detection System. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Claudiu Duma, Martin Karresand, Nahid Shahmehri, Germano Caronni A Trust-Aware, P2P-Based Overlay for Intrusion Detection. Search on Bibsonomy DEXA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Youhui Zhang, Dongsheng Wang 0002 Research on Object-Storage-Based Intrusion Detection. Search on Bibsonomy ICPADS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Zhenwei Yu 0001, Jeffrey J. P. Tsai Fuzzy Model Tuning for Intrusion Detection Systems. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jun-Cheol Jeon, Eun-Yeung Choi, Kee-Young Yoo Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks. Search on Bibsonomy PRIMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jung Hun Kang, Myong-Soon Park Layer-Based ID Assigning Method for Sensor Networks. Search on Bibsonomy ICUCT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Zeng-Quan Wang, Hui-qiang Wang, Rui-jie Zhang Analysis of an Intelligent Agent Intrusion Response System. Search on Bibsonomy IAT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Krzysztof Juszczyszyn, Ngoc Thanh Nguyen 0001, Grzegorz Kolaczek, Adam Grzech, Agnieszka Pieczynska, Radoslaw P. Katarzyniak Agent-Based Approach for Distributed Intrusion Detection System Design. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Byung kwan Lee, Seung Hae Yang, Dong-Hyuck Kwon, Dai-Youn Kim PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Se-Yul Lee, Bong-Hwan Lee, Yeong-Deok Kim, Dong-Myung Shin, Chan-Hyun Youn A Neural Network Model for Detection Systems Based on Data Mining and False Errors. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Hoaison Nguyen, Toshio Oka, Hiroyuki Morikawa, Tomonori Aoyama SENS: A Scalable and Expressive Naming System using CAN Routing Algorithm. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Paola Inverardi, Leonardo Mostarda, Alfredo Navarra Distributed IDSs for enhancing Security in Mobile Wireless Sensor Networks. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Chien-Chuan Lin, Ming-Shi Wang Practical Intrusion Detection Using Genetic-Clustering. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Emmanuel Hooper Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Nathalie Dagorn Cooperative Intrusion Detection for Web Applications. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Mathew Graves, Mohammad Zulkernine Bridging the gap: software specification meets intrusion detector. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack languages, intrusion detection, software security, software specification
16A. A. Abimbola, Jose Munoz, William J. Buchanan Investigating False Positive Reduction in HTTP via Procedure Analysis. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Chryssis Georgiou, Nicolas C. Nicolaou, Alexander A. Shvartsman Fault-tolerant semifast implementations of atomic read/write registers. Search on Bibsonomy SPAA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF communication rounds, read/write registers, fault-tolerance, distributed algorithms, atomicity
16Wook-Shin Han, Kyu-Young Whang, Yang-Sae Moon A Formal Framework for Prefetching Based on the Type-Level Access Pattern in Object-Relational DBMSs. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF type-level access patterns, type-level access locality, Prefetching, object-relational DBMSs
16Crina Grosan, Ajith Abraham, Sang-Yong Han MEPIDS: Multi-Expression Programming for Intrusion Detection System. Search on Bibsonomy IWINAC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Fernando Godínez, Dieter Hutter, Raúl Monroy Audit File Reduction Using N-Gram Models. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Qiang Duan, Chenyi Hu, Han-Chieh Wei Enhancing network intrusion detection systems with interval methods. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF intrusion detection, network control, interval method
16Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum RIDA: Robust Intrusion Detection in Ad Hoc Networks. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 IDGraphs: Intrusion Detection and Analysis Using Histographs. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Brushing and Linking, Visualization, Intrusion Detection, Interactive System, Dynamic Query, Correlation Matrix
16BoonPing Lim, Md. Safi Uddin Statistical-Based SYN-Flooding Detection Using Programmable Network Processor. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF non-parametric CUSUM, token bucket filtering, network security, network processor, SYN-flooding
16Bruce D. Caulkins, Joohan Lee, Morgan C. Wang A dynamic data mining technique for intrusion detection systems. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF signature detection, data mining, decision tree, anomaly detection, data modeling, intrusion detection system
16Fernando Godínez, Dieter Hutter, Raúl Monroy On the Role of Information Compaction to Intrusion Detection. Search on Bibsonomy ISSADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Mohammad Feroz Raihan, Mohammad Zulkernine Detecting Intrusions Specified in a Software Specification Language. Search on Bibsonomy COMPSAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Dong Seong Kim 0001, Ha-Nam Nguyen, Syng-Yup Ohn, Jong Sou Park Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System. Search on Bibsonomy ISNN (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Takashi Horie, Toshiharu Harada, Kazuo Tanaka Adaptive Access Policy for the Linux Kernel. Search on Bibsonomy SAINT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Simon P. Chung, Aloysius K. Mok On Random-Inspection-Based Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random inspection, intrusion detection, computer security, Mimicry attacks
16Eric Totel, Frédéric Majorczyk, Ludovic Mé COTS Diversity Based Intrusion Detection and Application to Web Servers. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF COTS diversity, Intrusion detection, anomaly detection, design diversity
16Amithalal Caldera, Yogesh Deshpande Effectively Capturing User Navigation Paths in the Web Using Web Server Logs. Search on Bibsonomy ICWE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Jungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choonsik Park, Dong-Kyoo Kim An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction. Search on Bibsonomy ICOIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Bailing Wang, Binxing Fang, Xiao-chun Yun A Worm Behavioral Approach to Susceptible Host Detection. Search on Bibsonomy GCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Akira Yamada 0001, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Bruce D. Caulkins, Joohan Lee, Morgan C. Wang Packet- vs. Session-Based Modeling for Intrusion Detection Systems. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Zvi Gutterman, Dahlia Malkhi Hold Your Sessions: An Attack on Java Session-Id Generation. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF space-time tradeoff, HTTP, web security, pseudo random number generators
16Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, Po-Chi Shih Integrating Grid with Intrusion Detection. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Nen-Fu Huang, Chia-Nan Kao, Hsien-Wei Hung, Gin-Yuan Jai, Chia-Lin Lin Apply Data Mining to Defense-in-Depth Network Security System. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Pradeep Kumar 0001, M. Venkateswara Rao, P. Radha Krishna 0001, Raju S. Bapi, Arijit Laha Intrusion Detection System Using Sequence and Set Preserving Metric. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Emilio Corchado, Álvaro Herrero 0001, José Manuel Sáiz Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition. Search on Bibsonomy ICANN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Fang Liu 0001, Lan Luo Immune Clonal Selection Wavelet Network Based Intrusion Detection. Search on Bibsonomy ICANN (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Junfeng Tian, Weidong Zhao, Ruizhong Du D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Ki-Won Yeom, Ji-Hyung Park An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Hee Suk Seo, Tae Ho Cho Application of Fuzzy Logic for Distributed Intrusion Detection. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Jian-Hua Song, Fan Hong, Yajun Guo A Distributed Monitoring Mechanism for Mobile Ad Hoc Networks. Search on Bibsonomy ISPAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Yonggang Chu, Jun Li, Yixian Yang The Architecture of the Large-scale Distributed Intrusion Detection System. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Singh 0001, Timothy K. Tsai SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Voice over IP system, Cross-protocol detection, Stateful detection, Intrusion detection, SIP, RTP
16Jeffrey B. Colombe, Gregory Stephens Statistical profiling and visualization for detection of malicious insider attacks on computer networks. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF human-computer interaction, information visualization, anomaly detection, cognitive load
16Yanxin Wang, Andrew S. Miner, Johnny Wong, Prem Uppuluri Improving Feature Selection in Anomaly Intrusion Detection Using Specifications. Search on Bibsonomy ICDCIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Young H. Cho, William H. Mangione-Smith Deep Packet Filter with Dedicated Logic and Read Only Memories. Search on Bibsonomy FCCM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Manhee Lee, Eun Jung Kim 0001, Cheol Won Lee A Source Identification Scheme against DDoS Attacks in Cluster Interconnects. Search on Bibsonomy ICPP Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Fabricio Sergio de Paula, Paulo L. de Geus Attack Evidence Detection, Recovery, and Signature Extraction with ADenoIdS. Search on Bibsonomy ICT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Julien Letessier, François Bérard Visual tracking of bare fingers for interactive surfaces. Search on Bibsonomy UIST The full citation details ... 2004 DBLP  DOI  BibTeX  RDF finger tracking with computer vision, large interactive surface, multi-user multi-hand interaction
16Byoung-Koo Kim, Ik-Kyun Kim, Ki-Young Kim, Jongsoo Jang Design and Implementation of High-Performance Intrusion Detection System. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Sachin P. Joglekar, Stephen R. Tate ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch Protocol Analysis in Intrusion Detection Using Decision Tree. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati A Novel Remote User Authentication Scheme Through Dynamic Login Identity. Search on Bibsonomy IWDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Eun-Ser Lee, Sun-myoung Hwang Software Design Method Enhanced by Appended Security Requirements. Search on Bibsonomy PCM (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Steve Wood, Gordon W. Romney Protection methods against IP packet attacks. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF TCP vulnerabilities, UDP vulnerabilities, packet inspection, intrusion detection systems, firewalls, access control list, intrusion prevention systems
16Ramana Rao Kompella, Sumeet Singh, George Varghese On scalable attack detection in the network. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, scalability, denial of service
16Keon-Myung Lee, Sang Ho Lee 0002 A Multiagent Architecture for Privacy-Preserving ID-Based Service in Ubiquitous Computing Environment. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas Hybrid Feature Selection for Modeling Intrusion Detection Systems. Search on Bibsonomy ICONIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 2223 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license