The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NSS"( http://dblp.L3S.de/Venues/NSS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/nss

Publication years (Num. hits)
2009 (90) 2010 (91) 2011 (58) 2012 (40) 2013 (72) 2014 (48) 2015 (42) 2016 (36) 2017 (60) 2018 (37) 2019 (48) 2020 (27) 2021 (25) 2022 (42) 2023 (22)
Publication types (Num. hits)
inproceedings(723) proceedings(15)
Venues (Conferences, Journals, ...)
NSS(738)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 215 occurrences of 177 keywords

Results
Found 738 publication records. Showing 738 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1W. K. Daniel Pun, Ricardo Santa If Cross-Functional Teams are the Answer, What is the Question?. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Intelligent Information Systems, Cross-functional Teams
1Ming-Ming Xiao, Shun-Zheng Yu, Yu Wang 0017 Automatic Network Protocol Automaton Extraction. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF protocol reverse engineering, automaton inference, regular expression, Protocol analysis
1Rossilawati Sulaiman, Dharmendra Sharma 0001, Wanli Ma, Dat Tran 0001 A Multi-agent Security Architecture. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, cryptography, mobile agent, multi-agent, e-health
1Khalid Iqbal, Sohail Asghar Generating Hierarchical Association Rules with the Use of Bayesian Network. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Bayesian Network, Association Rules, BSM
1Matús Harvan, Alexander Pretschner State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, operating systems, information flow, usage control, system calls, reference monitor, enforcement
1Xiaoxun Sun, Hua Wang 0002, Lili Sun Extended K-Anonymity Models Against Attribute Disclosure. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1John Mashford, Dhammika De Silva, Donavan Marney, Stewart Burn An Approach to Leak Detection in Pipe Networks Using Analysis of Monitored Pressure Values by Support Vector Machine. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF pipe networks, pattern recognition, support vector machines, leak detection
1Mohammed Md. Mazid, A. B. M. Shawkat Ali, Kevin S. Tickle A Comparison Between Rule Based and Association Rule Mining Algorithms. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Partial Decision Tree (PART), DARPA (Defense Advanced Research Projects Agency), Classification, Association Rule Mining, Apriori
1Shui Yu 0001, Theerasak Thapngam, Jianwen Liu, Su Wei, Wanlei Zhou 0001 Discriminating DDoS Flows from Flash Crowds Using Information Distance. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Measurement, Distance, DDoS Attack
1Miho Itoh Contextual Analysis Methods Capturing Knowledge Representation Related to the Reputation. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF interpreting coherence of multiple semantic, representations in contextual sentences, overall role relation between words based on CEE
1Ahmed Al-Nazer, Adnan Abdul-Aziz Gutub Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF text watermarking, text hiding, Arabic text, maximizing capacity, Kashida, text steganography
1Burcu Yurekli, Gökhan Çapan, Baris Yilmazel, Özgür Yilmazel Guided Navigation Using Query Log Mining through Query Expansion. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF query log mining, guided navigation, performance, query expansion
1Roland Dodd, Andrew Chiou, Xinghuo Yu 0001, Ross Broadfoot Industrial Process Model Integration Using a Blackboard Model within a Pan Stage Decision Support System. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Industrial decision support, sugar production, sugar mill, intelligent systems, blackboard system
1Mansour M. Alsulaiman, Aasem N. Alyahya, Raed A. Alkharboush, Nasser S. Alghafis Intrusion Detection System Using Self-Organizing Maps. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Detection system, hierarchical SOM, self organizing maps, Intrusion Detection system, Intrusion
1Book-Sung Park, Dan Qi, Yanli Liu, Bolormaa Khurelbaatar, Chul-Ju Kim A Novel Quad-band Internal Antenna with Ni/Ag/Ni Structure for Wireless Mobile Handset. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF internal antenna, Ni/Ag/Ni structure, handset
1Thaier Hayajneh, Prashant Krishnamurthy, David Tipper DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xiong Deng, Moustafa Ghanem, Yike Guo Real-Time Data Mining Methodology and a Supporting Framework. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF real-time data mining, dynamic data mining process, framework, environment modelling
1Jesmin Nahar, Kevin S. Tickle, A. B. M. Shawkat Ali, Yi-Ping Phoebe Chen Early Breast Cancer Identification: Which Way to Go? Microarray or Image Based Computer Aided Diagnosis!. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Fernando Bernal-Hidalgo, Manuel Sánchez, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte Trusted Network Access Control in the Eduroam Federation. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF NEA, eduroam, federation, network access control
1A. John Prakash, V. Rhymend Uthariaraj Secure Authenticated Key Establishment Protocol for Ad Hoc Networks. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multicrypt, N-way Cryptosystem, Key management, Multicast Security
1Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou Characterising the Evolution in Scanning Activity of Suspicious Hosts. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pedro Chávez Lugo, Juan Manuel Garcia Garcia, Juan J. Flores A System for Distributed SELinux Policy Management. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access, distributed, control, policies, administration, Kerberos, SELinux
1Rong-Jian Chen, Yu-Cheng Peng, Jui-Lin Lai, Shi-Jinn Horng Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AES Crypto Core, Cryptography, Architecture Design, WPAN
1Qin Li, Qingkai Zeng A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network Protocols. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ad hoc networks, secure routing, control-flow analysis, concurrent objects
1Chan Yeob Yeun, Salman Mohammed Al-Marzouqi Practical Implementations for Securing VoIP Enabled Mobile Devices. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Practical Implementations, Security, VoIP
1Kit Yan Chan, Siow Yong Low, Sven Nordholm, Ka Fai Cedric Yiu, Sai-Ho Ling Speech Recognition Enhancement Using Beamforming and a Genetic Algorithm. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF signal enhancement, genetic algorithm, Speech recognition, beamforming
1Ananda Jeeva, William W. Guo Determining Supply Chain Flexibility Using Statistics and Nueral Networks: A Comparative Study. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wei Li 0013, Dawu Gu, Yong Wang, Juanru Li, Zhiqiang Liu 0001 An Extension of Differential Fault Analysis on AES. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yang Zhang A Pseudonym-Based Signature Scheme for Dynamic Clusters in Ad Hoc Networks. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pseudonym System, Ad Hoc Network, Anonymity, Digital Signature Scheme
1Reginald Lal, Andrew Chiou Significance of Computional Intelligence Method in Computer Networks. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conventional methods, fuzzy logic, congestion control, computer networks, computation intelligence
1Nasim Vatani, Amir Masoud Rahmani, Mohammad Ebrahim Shiri An Information Filtering Approach. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Positive document, Boundary document, Negative document, User profile updating, Web mining, Information filtering, Concept
1Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Eimear Gallery Property Based Attestation and Trusted Computing: Analysis and Challenges. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Property Attestation, Trusted Computing
1Hyunhee Park, Meejoung Kim, Chul-Hee Kang F-TAD: Traffic Anomaly Detection for Sub-networks Using Fisher Linear Discriminant. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adaptive defense system, Traffic analysis and measurment, Anomaly detection, Fisher linear discriminant
1Muhammad Khurram Khan Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, cryptanalysis, smart card, password
1Saroj Ratnoo, Kamal Kant Bharadwaj Discovery of Exceptions: A Step towards Perfection. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF censored production rule, genetic algorithm, Knowledge discovery, exceptions handling
1Noel Henry Patson Visualizing Global Patterns in Huge Digraphs. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF visualization, digraphs
1Roland Dodd, Andrew Chiou, Xinghuo Yu 0001, Ross Broadfoot Functional Characteristics and Proposed Deployment Infrastructure of an Industrial Decision Support System within a Sugar Mill Crystallisation Stage. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Industrial decision support, sugar production, sugar mill, deployment infrastructure, intelligent systems
1Bing Sun, Ya-Ping Zhang, Ning Zhang Self-Protection Model Based on Intelligent Agent. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF selfprotection, agent, intrusion detection, network security
Displaying result #701 - #738 of 738 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license