The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for intrusion with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1991 (15) 1992-1994 (22) 1995-1996 (19) 1997 (21) 1998 (21) 1999 (101) 2000 (82) 2001 (116) 2002 (179) 2003 (304) 2004 (453) 2005 (612) 2006 (626) 2007 (603) 2008 (674) 2009 (552) 2010 (420) 2011 (377) 2012 (338) 2013 (307) 2014 (319) 2015 (323) 2016 (370) 2017 (441) 2018 (595) 2019 (702) 2020 (790) 2021 (953) 2022 (1105) 2023 (1303) 2024 (309)
Publication types (Num. hits)
article(5186) book(16) data(15) incollection(79) inproceedings(7542) phdthesis(194) proceedings(20)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3828 occurrences of 1280 keywords

Results
Found 13052 publication records. Showing 13052 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
26Pedro Alípio, Paulo Carvalho 0002, José Neves 0001 Using CLIPS to Detect Network Intrusions. Search on Bibsonomy EPIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion detection, CLIPS, SNORT, attack scenarios, certainty factors
26Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Nigel H. Lin, Louis H. Lin A Behavior-Based Anti-Worm System. Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Lambent Anti-Worm System (LAWS), Malicious worm, Mobile Agent, Intrusion Detection System (IDS)
26Svetlana P. Sokolova, Ruslan S. Ivlev Computer Immunology System with Variable Configuration. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cytokines networks, interval mathematics model, interval stability and robustness, intrusion detection
26R. Sekar 0001, Ajay Gupta 0002, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou Specification-based anomaly detection: a new approach for detecting network intrusions. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF intrusion detection, anomaly detection, network monitoring
26Nathan Carey, Andrew J. Clark, George M. Mohay IDS Interoperability and Correlation Using IDMEF and Commodity Systems. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Interoperability, Intrusion Detection, Network Management, Correlation, Data Analysis
25Françoise Sailhan, Julien Bourgeois, Valérie Issarny A Security Supervision System for Hybrid Networks. Search on Bibsonomy Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF host-based and network intrusion detection, security and protection management, event notification, Distributed intrusion detection
25J. Lane Thames, Randal T. Abler, David Keeling A distributed firewall and active response architecture providing preemptive protection. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF active intrusion response, distributed firewalls, intrusion detection systems
25Jesus Molina, Xavier Chorin, Michel Cukier Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SSH compromises, filesystem data, host intrusion detection systems, intrusion detection systems evaluation
25Ian F. Akyildiz, Eylem Ekici, Gaofeng Yue A Distributed Multicast Routing Scheme for Multi-Layered Satellite IP Networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion response, cooperative detection, mobile ad-hoc networks, intrusion detection, anomaly detection
24Ossi Kaltiokallio, Maurizio Bocca, Lasse Eriksson Distributed RSSI processing for intrusion detection in indoor environments. Search on Bibsonomy IPSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Javier G. Marín-Blázquez, Gregorio Martínez Pérez Intrusion detection using a linguistic hedged fuzzy-XCS classifier system. Search on Bibsonomy Soft Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani Evaluating Intrusion Detection Systems in High Speed Networks. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Ryutaro Fujimoto, Hiroyuki Okamura, Tadashi Dohi Security Evaluation of an Intrusion Tolerant System with MRSPNs. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Jaafar Almasizadeh, Mohammad Abdollahi Azgomi Intrusion Process Modeling for Security Quantification. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Jin-Hee Cho, Ing-Ray Chen Performance analysis of distributed intrusion detection protocols for mobile group communication systems. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Siraj A. Shaikh, Howard Chivers, Philip Nobles, John A. Clark, Hao Chen 0032 A Deployment Value Model for Intrusion Detection Sensors. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Zenghui Liu, Yingxu Lai A Data Mining Framework for Building Intrusion Detection Models Based on IPv6. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Patricia Mostardinha, Fernão Vístulo de Abreu Intrusion Detection in Circular Frustrated Systems: An Eminently Parallel Processing Algorithm. Search on Bibsonomy UC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Jingyu Hua, Mingchu Li, Kouichi Sakurai, Yizhi Ren Efficient Intrusion Detection Based on Static Analysis and Stack Walks. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Weiming Hu, Wei Hu, Stephen J. Maybank AdaBoost-Based Algorithm for Network Intrusion Detection. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Inez Raguenet, Carlos Maziero A Fuzzy Model for the Composition of Intrusion Detectors. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Robert L. Fanelli A Hybrid Model for Immune Inspired Network Intrusion Detection. Search on Bibsonomy ICARIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Stefano Zanero, Giuseppe Serazzi Unsupervised learning algorithms for intrusion detection. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Dayu Yang, Hairong Qi 0001 A network intrusion detection method using independent component analysis. Search on Bibsonomy ICPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Luca Foschini 0002, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna A Parallel Architecture for Stateful, High-Speed Intrusion Detection. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Chien-Chuan Lin, Ming-Shi Wang Depth evaluation intrusion detection using Coloured Stochastic Petri Nets. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Salvatore D'Antonio, Simon Pietro Romano, Steven Simpson, Paul Smith 0001, David Hutchison 0001 A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks. Search on Bibsonomy IWSOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection. Search on Bibsonomy ECBS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. Rozenblit An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation. Search on Bibsonomy ECBS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Morteza Analoui, Behrouz Minaei-Bidgoli, Mohammad Hossein Rezvani Hierarchical Classifier Combination and Its Application in Networks Intrusion Detection. Search on Bibsonomy ICDM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Kjetil Haslum, Ajith Abraham, Svein J. Knapskog DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Mohammad Saniee Abadeh, Jafar Habibi, M. Daneshi, M. Jalali, M. Khezrzadeh Intrusion detection using a hybridization of evolutionary fuzzy systems and artificial immune systems. Search on Bibsonomy IEEE Congress on Evolutionary Computation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Alexander Krizhanovsky, Alexander Marasanov An Approach for Adaptive Intrusion Prevention Based on The Danger. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Reza Sadoddin, Ali A. Ghorbani 0001 A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection. Search on Bibsonomy MLDM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Mohammad Gias Uddin 0001, Hossain Shahriar, Mohammad Zulkernine ACIR: An Aspect-Connector for Intrusion Response. Search on Bibsonomy COMPSAC (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Yingfang Fu, Jingsha He, Guorui Li A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks. Search on Bibsonomy COMPSAC (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Xin Xu, Yirong Luo A Kernel-Based Reinforcement Learning Approach to Dynamic Behavior Modeling of Intrusion Detection. Search on Bibsonomy ISNN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Birger Tödtmann, Stephan Riebach, Erwin P. Rathgeb The Honeynet Quarantine: Reducing Collateral Damage Caused by Early Intrusion Response. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Fang-Yie Leu, Fuu-Cheng Jiang, Ming-Chang Li, Jia-Chun Lin An Enhanced DGIDE Platform for Intrusion Detection. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Timothy Buennemeyer, Faiz Munshi, Randy C. Marchany, Joseph G. Tront Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Hai-Jun Xiao, Fan Hong, Zhao-Li Zhang, Junguo Liao Intrusion Detection Using Ensemble of SVM Classifiers. Search on Bibsonomy FSKD (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24You Chen, Wen-Fa Li, Xueqi Cheng Toward Building Lightweight Intrusion Detection System Through Modified RMHC and SVM. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, Edwin Hsing-Mean Sha Parallel Network Intrusion Detection on Reconfigurable Platforms. Search on Bibsonomy EUC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Satoshi Kawabata, Shinsaku Hiura, Kosuke Sato 3D Intrusion Detection System with Uncalibrated Multiple Cameras. Search on Bibsonomy ACCV (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Geethapriya Thamilarasu, Ramalingam Sridhar Toward Building a Multi-level Robust Intrusion Detection Architecture for Distributed Mobile Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao Conditional Random Fields for Intrusion Detection. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Simon P. Chung, Aloysius K. Mok Collaborative Intrusion Prevention. Search on Bibsonomy WETICE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Jiancheng Ni 0001, Zhishu Li, Jirong Sun, Jianchuan Xing Self-adaptive Intrusion Detection System for Computational Grid. Search on Bibsonomy TASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Zhuowei Li 0001, Amitabha Das, Jianying Zhou 0001 Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Xuren Wang, Famei He, Lizhen Liu Application of Rough Set Theory to Intrusion Detection System. Search on Bibsonomy GrC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Paulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch Intrusion-tolerant middleware: the road to automatic security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit A Hybrid Intrusion Detection and Visualization System. Search on Bibsonomy ECBS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Ashish Gehani, Surendar Chandra, Gershon Kedem Augmenting storage with an intrusion response primitive to ensure the security of critical data. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Wei Zhang 0005, Shaohua Teng, Xiufen Fu, Lin Wang 0010 Research on Communication Mechanism among Cooperating Multi-Intrusion Detection Agents. Search on Bibsonomy IEEE ICCI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24SunJun Liu, Tao Li 0016, Diangang Wang, Kui Zhao, Xun Gong 0006, Xiaoqin Hu, Chun Xu, Gang Liang Immune Multi-agent Active Defense Model for Network Intrusion. Search on Bibsonomy SEAL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Upinder Kaur, R. B. Patel Intrusion Detection in Mobile Ad-Hoc Networks: A Mobile Agent Approach. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Dalila Boughaci, Habiba Drias, Ahmed Bendib, Youcef Bouznit, Belaid Benhamou Distributed Intrusion Detection Framework based on Autonomous and Mobile Agents. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Jakub Botwicz, Piotr Buciak, Piotr Sapiecha Building Dependable Intrusion Prevention Systems. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Xuren Wang, Famei He, Rongsheng Xu Modeling Intrusion Detection System by Discovering Association Rule in Rough Set Theory Framework. Search on Bibsonomy CIMCA/IAWTIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Hee Suk Seo, Taekyung Kim, Hyungjong Kim 0002 Modeling of Distributed Intrusion Detection Using Fuzzy System. Search on Bibsonomy ICIC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Xun Gong 0006, Tao Li 0016, Gang Liang, Tiefang Wang, Jin Yang, Xiaoqin Hu Immunity and Mobile Agent Based Grid Intrusion Detection. Search on Bibsonomy ICIC (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Alexandre Schulter, Julio Albuquerque Reis, Fernando Luiz Koch, Carlos Becker Westphall A Grid-based Intrusion Detection System. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Claudiu Duma, Martin Karresand, Nahid Shahmehri, Germano Caronni A Trust-Aware, P2P-Based Overlay for Intrusion Detection. Search on Bibsonomy DEXA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Piya Techateerawat, Andrew Jennings Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks. Search on Bibsonomy IAT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Jun Wu 0015, Chong-Jun Wang, Jun Wang 0024, Shifu Chen Dynamic Hierarchical Distributed Intrusion Detection System Based on Multi-Agent System. Search on Bibsonomy IAT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Seung-Hyun Paek, Yoon-Keun Oh, Do-Hoon Lee sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Yan Gao 0003, Zhichun Li, Yan Chen 0004 A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Hyung-Woo Lee Lightweight Wireless Intrusion Detection Systems Against DDoS Attack. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Yanheng Liu, Daxin Tian, Bin Li A Wireless Intrusion Detection Method Based on Dynamic Growing Neural Network. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Shao-Shin Hung, Damon Shing-Min Liu An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Ruiping Ma, Liudong Xing, Howard E. Michel Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Frédéric Massicotte, François Gagnon, Yvan Labiche, Lionel C. Briand, Mathieu Couture Automatic Evaluation of Intrusion Detection Systems. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Francisco Ibarra Picó, Angel Grediaga Olivo, F. Garcia-Crespi, A. Camara An Electronic Reconfigurable Neural Architecture for Intrusion Detection. Search on Bibsonomy IWINAC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Chi-Ho Tsang, Sam Kwong, Hanli Wang Anomaly Intrusion Detection Using Multi-Objective Genetic Fuzzy System and Agent-Based Evolutionary Computation Framework. Search on Bibsonomy ICDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Thomas Stibor, Jonathan Timmis, Claudia Eckert 0001 On the appropriateness of negative selection defined over Hamming shape-space as a network intrusion detection system. Search on Bibsonomy Congress on Evolutionary Computation The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Fernando Godínez, Dieter Hutter, Raúl Monroy On the Role of Information Compaction to Intrusion Detection. Search on Bibsonomy ISSADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Kaile Su, Congxin Zhao, Guanfeng Lv, Han Lin, Qingliang Chen Formal Analysis and Improvement of the State Transition Model for Intrusion Tolerant System. Search on Bibsonomy WINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Dengguo Feng, Ji Xiang Experiences on Intrusion Tolerance Distributed Systems. Search on Bibsonomy COMPSAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Anand Patwardhan, Jim Parker 0002, Anupam Joshi, Michaela Iorga, Tom Karygiannis Secure Routing and Intrusion Detection in Ad Hoc Networks. Search on Bibsonomy PerCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Peng Fu 0002, Deyun Zhang, Lei Wang, Zhongxing Duan Intelligent Hierarchical Intrusion Detection System for Secure Wireless Ad Hoc Network. Search on Bibsonomy ISNN (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Giorgio Giacinto, Roberto Perdisci, Fabio Roli Network Intrusion Detection by Combining One-Class Classifiers. Search on Bibsonomy ICIAP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Pattern Recognition, Computer Security
24Hai-Hua Gao, Hui-Hua Yang, Xing-Yu Wang Principal Component Neural Networks Based Intrusion Feature Extraction and Detection Using SVM. Search on Bibsonomy ICNC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Hengming Zou, Henghui Zou PDE-Based Intrusion Forecast. Search on Bibsonomy ICNC (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Soumya Banerjee, Crina Grosan, Ajith Abraham IDEAS: Intrusion Detection based on Emotional Ants for Sensors. Search on Bibsonomy ISDA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Shi Zhong, Taghi M. Khoshgoftaar, Shyam Varan Nath A Clustering Approach to Wireless Network Intrusion Detection. Search on Bibsonomy ICTAI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Hai Jin 0001, Zhiling Yang, Jianhua Sun 0002, Xuping Tu, Zongfen Han CIPS: Coordinated Intrusion Prevention System. Search on Bibsonomy ICOIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Wei Pan, Weihua Li A Hybrid Neural Network Approach to the Classification of Novel Attacks for Intrusion Detection. Search on Bibsonomy ISPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Bruce D. Caulkins, Joohan Lee, Morgan C. Wang Packet- vs. Session-Based Modeling for Intrusion Detection Systems. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Pradeep Kumar 0001, M. Venkateswara Rao, P. Radha Krishna 0001, Raju S. Bapi, Arijit Laha Intrusion Detection System Using Sequence and Set Preserving Metric. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Zhuowei Li 0001, Amitabha Das, Jianying Zhou 0001 USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. Search on Bibsonomy PAKDD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Tao Li 0016, XiaoJie Liu, Hongbin Li 0001 A New Model for Dynamic Intrusion Detection. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Seongje Cho, Hyeyoung Chang, HongGeun Kim, WoongChul Choi SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Jingmin Zhou, Adam J. Carlson, Matt Bishop Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24 An Intrusion Detection System for AODV. Search on Bibsonomy ICECCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov, Alexander Ulanov Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Charles Iheagwara, Andrew Blyth, Mike Bennett Architectural and Functional Issues in Systems Requirements Specifications for Wireless Intrusion Detection Systems Implementation. Search on Bibsonomy Systems Communications The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Khaja Mohammad Shazzad, Jong Sou Park Optimization of Intrusion Detection through Fast Hybrid Feature Selection. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Kun Xiao, Ji Zheng, Xin Wang 0002, Xiangyang Xue A Novel Peer-to-Peer Intrusion Detection System. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Yanxiang He, Wei Chen 0006, Min Yang 0001, Wenling Peng Ontology Based Cooperative Intrusion Detection System. Search on Bibsonomy NPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 13052 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license