|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1161 occurrences of 620 keywords
|
|
|
Results
Found 2227 publication records. Showing 2223 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
16 | Marc Langheinrich, Remo Marti |
RFID Privacy Using Spatially Distributed Shared Secrets. |
UCS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Kai Ouyang, Xiaowen Chu 0001, Lijun Dong, Hengqing Wang, Ting Cai |
MLCC: A Multi Layered Correlative Control Mechanism for the VPN Topology. |
IEEE NAS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Michael E. Kuhl, Jason Kistner, Kevin Costantini, Moises Sudit |
Cyber attack modeling and simulation for network security analysis. |
WSC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | A. B. Meijer |
A Methodology for Automated Extraction of the Optimal Pathways from Influence Diagrams. |
AIME |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Michela Becchi, Patrick Crowley |
A hybrid finite automaton for practical deep packet inspection. |
CoNEXT |
2007 |
DBLP DOI BibTeX RDF |
regular expressions, DFA, deep packet inspection, NFA |
16 | Yousra Alkabani, Farinaz Koushanfar, Miodrag Potkonjak |
Remote activation of ICs for piracy prevention and digital right management. |
ICCAD |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Kenneth L. Ingham, Hajime Inoue |
Comparing Anomaly Detection Techniques for HTTP. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Hypertext transport protocol, Intrusion detection, Anomaly detection, HTTP, Comparison |
16 | Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers |
Alert Verification Evasion Through Server Response Forging. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Alert Verification, Network Intrusion Detection, Exploits, Evasion |
16 | Frédéric Massicotte, Mathieu Couture, Lionel C. Briand, Yvan Labiche |
Model-Driven, Network-Context Sensitive Intrusion Detection. |
MoDELS |
2007 |
DBLP DOI BibTeX RDF |
OCL constraints, Intrusion Detection, UML modeling |
16 | Dong Li, Zhitang Li, Li Wang 0015 |
Reducing False Positives Based on Time Sequence Analysis. |
FSKD (4) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin |
Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
feature selection, intrusion detection, rough set, particle swarm optimization |
16 | Emmanuel Hooper |
An Intelligent Intrusion Detection and Response System Using Hybrid Ward Hierarchical Clustering Analysis. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Emmanuel Hooper |
An Intelligent Intrusion Detection and Response System Using Network Quarantine Channels: Firewalls and Packet Filters. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Patrick D. McDaniel |
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed |
A Framework for an Adaptive Intrusion Detection System using Bayesian Network. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Grzegorz Kolaczek |
Multiagent Approach to Network Traffic Anomalies Uncertainty Level Assessment in Distributed Intrusion Detection System. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Bernard Haasdonk, Hans Burkhardt |
Classification with Invariant Distance Substitution Kernels. |
GfKl |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Jonathan Rabin, Onn Shehory |
Theoretically Founded Optimization of Auctioneer's Revenues in Expanding Auctions. |
AMEC/TADA |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Koji Nakano |
Randomized Initialization on the 1-Dimensional Reconfigurable Mesh. |
PDCAT |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 |
IDGraphs: Intrusion Detection and Analysis Using Stream Compositing. |
IEEE Computer Graphics and Applications |
2006 |
DBLP DOI BibTeX RDF |
Brushing and Linking, Intrusion Detection, Interactive System, Dynamic Query, Security Visualization, Correlation Matrix |
16 | Anoop Singhal, Sushil Jajodia |
Data warehousing and data mining techniques for intrusion detection systems. |
Distributed Parallel Databases |
2006 |
DBLP DOI BibTeX RDF |
Data mining and analysis, Intrusion detection, Data warehouse, OLAP, Computer security |
16 | Xiaoyun Hui, Guoren Wang, Huan Huo, Chuan Xiao 0001, Rui Zhou 0001 |
Region-Based Coding for Queries over Streamed XML Fragments. |
WISE |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Wei Zhang 0005, Shaohua Teng, Xiufen Fu, Lin Wang 0010 |
Research on Communication Mechanism among Cooperating Multi-Intrusion Detection Agents. |
IEEE ICCI |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Gaeil An, Joon S. Park |
Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Attack Response, Quality of Service, Network Security, Packet Marking, Denial of Service Attack |
16 | Emmanuel Hooper |
An Intelligent Detection and Response Strategy to False Positives and Network Attacks. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
16 | William D. Gropp, Rajeev Thakur |
Issues in Developing a Thread-Safe MPI Implementation. |
PVM/MPI |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Gianni Tedesco, Jamie Twycross, Uwe Aickelin |
Integrating Innate and Adaptive Immunity for Intrusion Detection. |
ICARIS |
2006 |
DBLP DOI BibTeX RDF |
Innate Immunity, Intrusion Detection, Dendritic Cells |
16 | Naval Bhandari, Anirudha Sahoo, Sridhar Iyer |
Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency. |
ICIT |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Fahimeh Raja, Mostafa Keikha, Maseud Rahgozar, Farhad Oroumchian |
Using Rich Document Representation in XML Information Retrieval. |
INEX |
2006 |
DBLP DOI BibTeX RDF |
Rich Document Representation, XML Information Retrieval |
16 | Adebayo O. Adetunmbi, Zhiwei Shi, Zhongzhi Shi, Olumide S. Adewale |
Network Anomalous Intrusion Detection using Fuzzy-Bayes. |
Intelligent Information Processing |
2006 |
DBLP DOI BibTeX RDF |
naïve-Bayes, intrusion detection, fuzzy |
16 | Koichi Kise, Tomohiro Nakai, Masakazu Iwamura, Satoshi Yokota |
Efficient Recognition of Planar Objects Based on Hashing of Keypoints - An Approach Towards Making the Physical World Clickable. |
ICPR (4) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Zeng-Quan Wang, Hui-qiang Wang, Rui-jie Zhang |
Research and Design on Intelligent Agent Intrusion Response System. |
CIMCA/IAWTIC |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Angel Grediaga Olivo, Francisco Ibarra, Federico García, Bernardo Ledesma Latorre, Francisco Brotóns |
Application of Neural Networks in Network Control and Information Security. |
ISNN (2) |
2006 |
DBLP DOI BibTeX RDF |
self organizative map, neural networks, intrusion detection system, perceptron |
16 | Xiaotao Wei, Houkuan Huang, Shengfeng Tian |
A Modified RBF Neural Network for Network Anomaly Detection. |
ISNN (2) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Yuehui Chen, Yong Zhang, Ajith Abraham |
Estimation of Distribution Algorithm for Optimization of Neural Networks for Intrusion Detection System. |
ICAISC |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Hee Suk Seo, Taekyung Kim, Hyungjong Kim 0002 |
Modeling of Distributed Intrusion Detection Using Fuzzy System. |
ICIC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Jun Qian, Chao Xu, Meilin Shi |
Redesign and Implementation of Evaluation Dataset for Intrusion Detection System. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Claudiu Duma, Martin Karresand, Nahid Shahmehri, Germano Caronni |
A Trust-Aware, P2P-Based Overlay for Intrusion Detection. |
DEXA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Youhui Zhang, Dongsheng Wang 0002 |
Research on Object-Storage-Based Intrusion Detection. |
ICPADS (1) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Zhenwei Yu 0001, Jeffrey J. P. Tsai |
Fuzzy Model Tuning for Intrusion Detection Systems. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Jun-Cheol Jeon, Eun-Yeung Choi, Kee-Young Yoo |
Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks. |
PRIMA |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Jung Hun Kang, Myong-Soon Park |
Layer-Based ID Assigning Method for Sensor Networks. |
ICUCT |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Zeng-Quan Wang, Hui-qiang Wang, Rui-jie Zhang |
Analysis of an Intelligent Agent Intrusion Response System. |
IAT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Krzysztof Juszczyszyn, Ngoc Thanh Nguyen 0001, Grzegorz Kolaczek, Adam Grzech, Agnieszka Pieczynska, Radoslaw P. Katarzyniak |
Agent-Based Approach for Distributed Intrusion Detection System Design. |
International Conference on Computational Science (3) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Byung kwan Lee, Seung Hae Yang, Dong-Hyuck Kwon, Dai-Youn Kim |
PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Se-Yul Lee, Bong-Hwan Lee, Yeong-Deok Kim, Dong-Myung Shin, Chan-Hyun Youn |
A Neural Network Model for Detection Systems Based on Data Mining and False Errors. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Hoaison Nguyen, Toshio Oka, Hiroyuki Morikawa, Tomonori Aoyama |
SENS: A Scalable and Expressive Naming System using CAN Routing Algorithm. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Paola Inverardi, Leonardo Mostarda, Alfredo Navarra |
Distributed IDSs for enhancing Security in Mobile Wireless Sensor Networks. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Chien-Chuan Lin, Ming-Shi Wang |
Practical Intrusion Detection Using Genetic-Clustering. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Emmanuel Hooper |
Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Nathalie Dagorn |
Cooperative Intrusion Detection for Web Applications. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Mathew Graves, Mohammad Zulkernine |
Bridging the gap: software specification meets intrusion detector. |
PST |
2006 |
DBLP DOI BibTeX RDF |
attack languages, intrusion detection, software security, software specification |
16 | A. A. Abimbola, Jose Munoz, William J. Buchanan |
Investigating False Positive Reduction in HTTP via Procedure Analysis. |
ICNS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Chryssis Georgiou, Nicolas C. Nicolaou, Alexander A. Shvartsman |
Fault-tolerant semifast implementations of atomic read/write registers. |
SPAA |
2006 |
DBLP DOI BibTeX RDF |
communication rounds, read/write registers, fault-tolerance, distributed algorithms, atomicity |
16 | Wook-Shin Han, Kyu-Young Whang, Yang-Sae Moon |
A Formal Framework for Prefetching Based on the Type-Level Access Pattern in Object-Relational DBMSs. |
IEEE Trans. Knowl. Data Eng. |
2005 |
DBLP DOI BibTeX RDF |
type-level access patterns, type-level access locality, Prefetching, object-relational DBMSs |
16 | Crina Grosan, Ajith Abraham, Sang-Yong Han |
MEPIDS: Multi-Expression Programming for Intrusion Detection System. |
IWINAC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Fernando Godínez, Dieter Hutter, Raúl Monroy |
Audit File Reduction Using N-Gram Models. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Qiang Duan, Chenyi Hu, Han-Chieh Wei |
Enhancing network intrusion detection systems with interval methods. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
intrusion detection, network control, interval method |
16 | Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum |
RIDA: Robust Intrusion Detection in Ad Hoc Networks. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 |
IDGraphs: Intrusion Detection and Analysis Using Histographs. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
Brushing and Linking, Visualization, Intrusion Detection, Interactive System, Dynamic Query, Correlation Matrix |
16 | BoonPing Lim, Md. Safi Uddin |
Statistical-Based SYN-Flooding Detection Using Programmable Network Processor. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
non-parametric CUSUM, token bucket filtering, network security, network processor, SYN-flooding |
16 | Bruce D. Caulkins, Joohan Lee, Morgan C. Wang |
A dynamic data mining technique for intrusion detection systems. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
signature detection, data mining, decision tree, anomaly detection, data modeling, intrusion detection system |
16 | Fernando Godínez, Dieter Hutter, Raúl Monroy |
On the Role of Information Compaction to Intrusion Detection. |
ISSADS |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Mohammad Feroz Raihan, Mohammad Zulkernine |
Detecting Intrusions Specified in a Software Specification Language. |
COMPSAC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Dong Seong Kim 0001, Ha-Nam Nguyen, Syng-Yup Ohn, Jong Sou Park |
Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System. |
ISNN (3) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Takashi Horie, Toshiharu Harada, Kazuo Tanaka |
Adaptive Access Policy for the Linux Kernel. |
SAINT |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Simon P. Chung, Aloysius K. Mok |
On Random-Inspection-Based Intrusion Detection. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
random inspection, intrusion detection, computer security, Mimicry attacks |
16 | Eric Totel, Frédéric Majorczyk, Ludovic Mé |
COTS Diversity Based Intrusion Detection and Application to Web Servers. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
COTS diversity, Intrusion detection, anomaly detection, design diversity |
16 | Amithalal Caldera, Yogesh Deshpande |
Effectively Capturing User Navigation Paths in the Web Using Web Server Logs. |
ICWE |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Jungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choonsik Park, Dong-Kyoo Kim |
An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction. |
ICOIN |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Bailing Wang, Binxing Fang, Xiao-chun Yun |
A Worm Behavioral Approach to Susceptible Host Detection. |
GCC |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Akira Yamada 0001, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka |
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Bruce D. Caulkins, Joohan Lee, Morgan C. Wang |
Packet- vs. Session-Based Modeling for Intrusion Detection Systems. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Zvi Gutterman, Dahlia Malkhi |
Hold Your Sessions: An Attack on Java Session-Id Generation. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
space-time tradeoff, HTTP, web security, pseudo random number generators |
16 | Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, Po-Chi Shih |
Integrating Grid with Intrusion Detection. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Nen-Fu Huang, Chia-Nan Kao, Hsien-Wei Hung, Gin-Yuan Jai, Chia-Lin Lin |
Apply Data Mining to Defense-in-Depth Network Security System. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Pradeep Kumar 0001, M. Venkateswara Rao, P. Radha Krishna 0001, Raju S. Bapi, Arijit Laha |
Intrusion Detection System Using Sequence and Set Preserving Metric. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Emilio Corchado, Álvaro Herrero 0001, José Manuel Sáiz |
Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition. |
ICANN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Fang Liu 0001, Lan Luo |
Immune Clonal Selection Wavelet Network Based Intrusion Detection. |
ICANN (1) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Junfeng Tian, Weidong Zhao, Ruizhong Du |
D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Ki-Won Yeom, Ji-Hyung Park |
An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Hee Suk Seo, Tae Ho Cho |
Application of Fuzzy Logic for Distributed Intrusion Detection. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Jian-Hua Song, Fan Hong, Yajun Guo |
A Distributed Monitoring Mechanism for Mobile Ad Hoc Networks. |
ISPAN |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Yonggang Chu, Jun Li, Yixian Yang |
The Architecture of the Large-scale Distributed Intrusion Detection System. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Singh 0001, Timothy K. Tsai |
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
Voice over IP system, Cross-protocol detection, Stateful detection, Intrusion detection, SIP, RTP |
16 | Jeffrey B. Colombe, Gregory Stephens |
Statistical profiling and visualization for detection of malicious insider attacks on computer networks. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
human-computer interaction, information visualization, anomaly detection, cognitive load |
16 | Yanxin Wang, Andrew S. Miner, Johnny Wong, Prem Uppuluri |
Improving Feature Selection in Anomaly Intrusion Detection Using Specifications. |
ICDCIT |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Young H. Cho, William H. Mangione-Smith |
Deep Packet Filter with Dedicated Logic and Read Only Memories. |
FCCM |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Manhee Lee, Eun Jung Kim 0001, Cheol Won Lee |
A Source Identification Scheme against DDoS Attacks in Cluster Interconnects. |
ICPP Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Fabricio Sergio de Paula, Paulo L. de Geus |
Attack Evidence Detection, Recovery, and Signature Extraction with ADenoIdS. |
ICT |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Julien Letessier, François Bérard |
Visual tracking of bare fingers for interactive surfaces. |
UIST |
2004 |
DBLP DOI BibTeX RDF |
finger tracking with computer vision, large interactive surface, multi-user multi-hand interaction |
16 | Byoung-Koo Kim, Ik-Kyun Kim, Ki-Young Kim, Jongsoo Jang |
Design and Implementation of High-Performance Intrusion Detection System. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Sachin P. Joglekar, Stephen R. Tate |
ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch |
Protocol Analysis in Intrusion Detection Using Decision Tree. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati |
A Novel Remote User Authentication Scheme Through Dynamic Login Identity. |
IWDC |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Eun-Ser Lee, Sun-myoung Hwang |
Software Design Method Enhanced by Appended Security Requirements. |
PCM (1) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Steve Wood, Gordon W. Romney |
Protection methods against IP packet attacks. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
TCP vulnerabilities, UDP vulnerabilities, packet inspection, intrusion detection systems, firewalls, access control list, intrusion prevention systems |
16 | Ramana Rao Kompella, Sumeet Singh, George Varghese |
On scalable attack detection in the network. |
Internet Measurement Conference |
2004 |
DBLP DOI BibTeX RDF |
security, scalability, denial of service |
16 | Keon-Myung Lee, Sang Ho Lee 0002 |
A Multiagent Architecture for Privacy-Preserving ID-Based Service in Ubiquitous Computing Environment. |
Australian Conference on Artificial Intelligence |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas |
Hybrid Feature Selection for Modeling Intrusion Detection Systems. |
ICONIP |
2004 |
DBLP DOI BibTeX RDF |
|
|
|