|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 215 occurrences of 177 keywords
|
|
|
Results
Found 738 publication records. Showing 738 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | W. K. Daniel Pun, Ricardo Santa |
If Cross-Functional Teams are the Answer, What is the Question?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 501-505, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Intelligent Information Systems, Cross-functional Teams |
1 | Ming-Ming Xiao, Shun-Zheng Yu, Yu Wang 0017 |
Automatic Network Protocol Automaton Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 336-343, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
protocol reverse engineering, automaton inference, regular expression, Protocol analysis |
1 | Rossilawati Sulaiman, Dharmendra Sharma 0001, Wanli Ma, Dat Tran 0001 |
A Multi-agent Security Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 184-191, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, cryptography, mobile agent, multi-agent, e-health |
1 | Khalid Iqbal, Sohail Asghar |
Generating Hierarchical Association Rules with the Use of Bayesian Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 528-533, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Bayesian Network, Association Rules, BSM |
1 | Matús Harvan, Alexander Pretschner |
State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 373-380, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
access control, operating systems, information flow, usage control, system calls, reference monitor, enforcement |
1 | Xiaoxun Sun, Hua Wang 0002, Lili Sun |
Extended K-Anonymity Models Against Attribute Disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 130-136, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | John Mashford, Dhammika De Silva, Donavan Marney, Stewart Burn |
An Approach to Leak Detection in Pipe Networks Using Analysis of Monitored Pressure Values by Support Vector Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 534-539, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
pipe networks, pattern recognition, support vector machines, leak detection |
1 | Mohammed Md. Mazid, A. B. M. Shawkat Ali, Kevin S. Tickle |
A Comparison Between Rule Based and Association Rule Mining Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 452-455, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Partial Decision Tree (PART), DARPA (Defense Advanced Research Projects Agency), Classification, Association Rule Mining, Apriori |
1 | Shui Yu 0001, Theerasak Thapngam, Jianwen Liu, Su Wei, Wanlei Zhou 0001 |
Discriminating DDoS Flows from Flash Crowds Using Information Distance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 351-356, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Measurement, Distance, DDoS Attack |
1 | Miho Itoh |
Contextual Analysis Methods Capturing Knowledge Representation Related to the Reputation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 552-559, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
interpreting coherence of multiple semantic, representations in contextual sentences, overall role relation between words based on CEE |
1 | Ahmed Al-Nazer, Adnan Abdul-Aziz Gutub |
Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 447-451, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
text watermarking, text hiding, Arabic text, maximizing capacity, Kashida, text steganography |
1 | Burcu Yurekli, Gökhan Çapan, Baris Yilmazel, Özgür Yilmazel |
Guided Navigation Using Query Log Mining through Query Expansion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 560-564, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
query log mining, guided navigation, performance, query expansion |
1 | Roland Dodd, Andrew Chiou, Xinghuo Yu 0001, Ross Broadfoot |
Industrial Process Model Integration Using a Blackboard Model within a Pan Stage Decision Support System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 489-494, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Industrial decision support, sugar production, sugar mill, intelligent systems, blackboard system |
1 | Mansour M. Alsulaiman, Aasem N. Alyahya, Raed A. Alkharboush, Nasser S. Alghafis |
Intrusion Detection System Using Self-Organizing Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 397-402, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Detection system, hierarchical SOM, self organizing maps, Intrusion Detection system, Intrusion |
1 | Book-Sung Park, Dan Qi, Yanli Liu, Bolormaa Khurelbaatar, Chul-Ju Kim |
A Novel Quad-band Internal Antenna with Ni/Ag/Ni Structure for Wireless Mobile Handset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 575-578, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
internal antenna, Ni/Ag/Ni structure, handset |
1 | Thaier Hayajneh, Prashant Krishnamurthy, David Tipper |
DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 73-80, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xiong Deng, Moustafa Ghanem, Yike Guo |
Real-Time Data Mining Methodology and a Supporting Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 522-527, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
real-time data mining, dynamic data mining process, framework, environment modelling |
1 | Jesmin Nahar, Kevin S. Tickle, A. B. M. Shawkat Ali, Yi-Ping Phoebe Chen |
Early Breast Cancer Identification: Which Way to Go? Microarray or Image Based Computer Aided Diagnosis!. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 456-461, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Fernando Bernal-Hidalgo, Manuel Sánchez, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte |
Trusted Network Access Control in the Eduroam Federation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 170-175, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
NEA, eduroam, federation, network access control |
1 | A. John Prakash, V. Rhymend Uthariaraj |
Secure Authenticated Key Establishment Protocol for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 87-94, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multicrypt, N-way Cryptosystem, Key management, Multicast Security |
1 | Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou |
Characterising the Evolution in Scanning Activity of Suspicious Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 344-350, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Chávez Lugo, Juan Manuel Garcia Garcia, Juan J. Flores |
A System for Distributed SELinux Policy Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 254-261, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Access, distributed, control, policies, administration, Kerberos, SELinux |
1 | Rong-Jian Chen, Yu-Cheng Peng, Jui-Lin Lai, Shi-Jinn Horng |
Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 36-43, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
AES Crypto Core, Cryptography, Architecture Design, WPAN |
1 | Qin Li, Qingkai Zeng |
A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 232-239, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ad hoc networks, secure routing, control-flow analysis, concurrent objects |
1 | Chan Yeob Yeun, Salman Mohammed Al-Marzouqi |
Practical Implementations for Securing VoIP Enabled Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 409-414, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Practical Implementations, Security, VoIP |
1 | Kit Yan Chan, Siow Yong Low, Sven Nordholm, Ka Fai Cedric Yiu, Sai-Ho Ling |
Speech Recognition Enhancement Using Beamforming and a Genetic Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 510-515, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
signal enhancement, genetic algorithm, Speech recognition, beamforming |
1 | Ananda Jeeva, William W. Guo |
Determining Supply Chain Flexibility Using Statistics and Nueral Networks: A Comparative Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 506-509, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wei Li 0013, Dawu Gu, Yong Wang, Juanru Li, Zhiqiang Liu 0001 |
An Extension of Differential Fault Analysis on AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 443-446, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yang Zhang |
A Pseudonym-Based Signature Scheme for Dynamic Clusters in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 208-215, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Pseudonym System, Ad Hoc Network, Anonymity, Digital Signature Scheme |
1 | Reginald Lal, Andrew Chiou |
Significance of Computional Intelligence Method in Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 468-473, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
conventional methods, fuzzy logic, congestion control, computer networks, computation intelligence |
1 | Nasim Vatani, Amir Masoud Rahmani, Mohammad Ebrahim Shiri |
An Information Filtering Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 30-35, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Positive document, Boundary document, Negative document, User profile updating, Web mining, Information filtering, Concept |
1 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Eimear Gallery |
Property Based Attestation and Trusted Computing: Analysis and Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 278-285, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Property Attestation, Trusted Computing |
1 | Hyunhee Park, Meejoung Kim, Chul-Hee Kang |
F-TAD: Traffic Anomaly Detection for Sub-networks Using Fisher Linear Discriminant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 328-335, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Adaptive defense system, Traffic analysis and measurment, Anomaly detection, Fisher linear discriminant |
1 | Muhammad Khurram Khan |
Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 420-424, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication, cryptanalysis, smart card, password |
1 | Saroj Ratnoo, Kamal Kant Bharadwaj |
Discovery of Exceptions: A Step towards Perfection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 540-545, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
censored production rule, genetic algorithm, Knowledge discovery, exceptions handling |
1 | Noel Henry Patson |
Visualizing Global Patterns in Huge Digraphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 480-483, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
visualization, digraphs |
1 | Roland Dodd, Andrew Chiou, Xinghuo Yu 0001, Ross Broadfoot |
Functional Characteristics and Proposed Deployment Infrastructure of an Industrial Decision Support System within a Sugar Mill Crystallisation Stage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 495-500, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Industrial decision support, sugar production, sugar mill, deployment infrastructure, intelligent systems |
1 | Bing Sun, Ya-Ping Zhang, Ning Zhang |
Self-Protection Model Based on Intelligent Agent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 199-202, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
selfprotection, agent, intrusion detection, network security |
Displaying result #701 - #738 of 738 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8] |
|