The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for IDS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1992 (34) 1993-1994 (22) 1995-1996 (22) 1997-1999 (16) 2000 (17) 2001 (26) 2002 (42) 2003 (49) 2004 (84) 2005 (143) 2006 (162) 2007 (158) 2008 (145) 2009 (120) 2010 (55) 2011 (28) 2012 (41) 2013 (41) 2014 (32) 2015 (36) 2016 (99) 2017 (28) 2018 (106) 2019 (114) 2020 (116) 2021 (110) 2022 (158) 2023 (173) 2024 (46)
Publication types (Num. hits)
article(491) book(2) data(3) incollection(6) inproceedings(1707) phdthesis(4) proceedings(10)
Venues (Conferences, Journals, ...)
BigDataSecurity/HPSC/IDS(307) CoRR(88) IDS(63) BigDataSecurity(36) IEEE Access(29) RAID(27) Comput. Secur.(16) ACSAC(15) AINA(14) IWCMC(14) ICC(13) ISI(13) Recent Advances in Intrusion D...(12) SAINT(10) Sensors(10) ARES(9) More (+10 of total 934)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1161 occurrences of 620 keywords

Results
Found 2227 publication records. Showing 2223 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Andrew H. Sung, Srinivas Mukkamala Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. Search on Bibsonomy SAINT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Abiola Abimbola, Qi Shi 0001, Madjid Merabti NetHost-Sensor: A Novel Concept in Intrusion Detection Systems. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Host-Based, Network-Based, Denial-of-Service and NetHost-Sensor, Intrusion Detection
16Sung-Keun Song, Hee Yong Youn, Jong-Koo Park Deciding Optimal Information Dispersal for Parallel Computing with Failures. Search on Bibsonomy PaCT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Greg Taleck Ambiguity Resolution via Passive OS Fingerprinting. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Bo Sun 0001, Kui Wu 0001, Udo W. Pooch Alert aggregation in mobile ad hoc networks. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF alert aggregation, mobile ad hoc networks, intrusion detection, routing security
16Joe Stevens, Shadan Saniepour SecureDirect: Proactive Security through Content Based Traffic Control. Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Yuebin Bai, Hidetsune Kobayashi New String Matching Technology for Network Security. Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Yingwu Zhu, Yiming Hu Efficient, Proximity-Aware Load Balancing for Structured P2P Systems. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Meng Zhang 0006, Jiubin Ju Space-Economical Reassembly for Intrusion Detection System. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Sang-Jun Han, Sung-Bae Cho Combining Multiple Host-Based Detectors Using Decision Tree. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2003 DBLP  DOI  BibTeX  RDF combining detectors, decision tree, anomaly detection
16Yukio Itakura, Masaki Hashiyada, Toshio Nagashima, Shigeo Tsujii Proposal on personal identifiers generated from the STR information of DNA. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF DNA personal ID, STR count, Matching probability, Correlation between loci, Biometric personal authentication
16Gordon Thomas Rohrmair, Gavin Lowe Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area. Search on Bibsonomy FASec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Thomas Toth, Christopher Krügel Accurate Buffer Overflow Detection via Abstract Payload Execution. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Intrusion Detecion, Buffer Overflow Exploit, Network Security
16Byoung-Koo Kim, Jong-Su Jang, Tai-Myung Chung Design of Network Security Control System for Cooperative Intrusion Detection. Search on Bibsonomy ICOIN (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Riccardo Boero, Marco Castellani 0003, Flaminio Squazzoni Cognitive Identity and Social Reflexivity of the Industrial District Firms. Going Beyond the "Complexity Effect" with Agent-Based Simulations. Search on Bibsonomy RASTA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Wook-Shin Han, Yang-Sae Moon, Kyu-Young Whang, Il-Yeol Song Prefetching Based on Type-Level Access Pattern in Object-Relational DBMSs. Search on Bibsonomy ICDE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Corinna Cortes, Daryl Pregibon, Chris Volinsky Communities of Interest. Search on Bibsonomy IDA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Robert K. Cunningham, Craig S. Stevenson Accurately Detecting Source Code of Attacks That Increase Privilege. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Machine Learning, Intrusion Detection, Malicious Code
16Marc G. Welz, Andrew Hutchison Interfacing Trusted Applications with Intrusion Detection Systems. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Victor Alves, José Neves 0001, Moreira Maia, Luís Nelas A Computational Environment for Medical Diagnosis Support Systems. Search on Bibsonomy ISMDA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Boaz Gelbord Graphical Techniques in Intrusion Detection Systems. Search on Bibsonomy ICOIN The full citation details ... 2001 DBLP  DOI  BibTeX  RDF graphs, Intrusion Detection Systems, isomorphism
16Josep Mangues-Bafalluy, Jordi Domingo-Pascual Analysis of the Requirements for ATM Multicasting Based on Per-PDU ID Assignment. Search on Bibsonomy NETWORKING The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Jongho Choy, Sung-Bae Cho Anomaly Detection of Computer Usage Using Artificial Intelligence Techniques. Search on Bibsonomy PRICAI Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Joachim Biskup, Ulrich Flegel On Pseudonymization of Audit Data for Intrusion Detection. Search on Bibsonomy Workshop on Design Issues in Anonymity and Unobservability The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Paul Brown Implementing the Spirit of SQL-99. Search on Bibsonomy SIGMOD Conference The full citation details ... 1999 DBLP  DOI  BibTeX  RDF INFORMIX, language standards, SQL, SQL, object-relational database
16Wenke Lee, Salvatore J. Stolfo, Kui W. Mok A Data Mining Framework for Building Intrusion Detection Models. Search on Bibsonomy S&P The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee, Ronald A. Olsson A Methodology for Testing Intrusion Detection Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF computer user simulation, software testing, Intrusion detection, computer security
14Siamak Layeghy, Marcus Gallagher, Marius Portmann Benchmarking the benchmark - Comparing synthetic and real-world Network IDS datasets. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Sifan Li, Yue Cao 0002, Shuohan Liu, Yuping Lai, Yongdong Zhu, Naveed Ahmad 0003 HDA-IDS: A Hybrid DoS Attacks Intrusion Detection System for IoT by using semi-supervised CL-GAN. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14K. R. Mohan Raj, Jeevaa Katiravan Dynamic trusted cross-layer IDS for secured communications in wireless networks using routing algorithm and FT-CNN. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Fengyuan Nie, Weiwei Liu 0002, Guangjie Liu, Bo Gao M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system. Search on Bibsonomy Internet Things The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Nadia Niknami, Jie Wu 0001 IDSMatch: A Novel Deployment Method for IDS Chains in SDNs. Search on Bibsonomy Network The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Savitha M. M, Basarkod P. I Securing AMI-IoT networks against multiple RPL attacks using ensemble learning IDS and light-chain based prediction detection and mitigation mechanisms. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Rana Alasmari, Areej Abdullah Alhogail Protecting Smart-Home IoT Devices From MQTT Attacks: An Empirical Study of ML-Based IDS. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Mansi Bhavsar, Yohannes Belayneh Bekele, Kaushik Roy 0003, John C. Kelly, Daniel B. Limbrick FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Erdal Özdogan A Comprehensive Analysis of the Machine Learning Algorithms in IoT IDS Systems. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Asaad Balla, Mohamed Hadi Habaebi, Elfatih Abdelrahman Ahmed Elsheikh, Md. Rafiqul Islam 0005, Fakher Eldin Mohamed Suliman, Sinil Mubarak Enhanced CNN-LSTM Deep Learning for SCADA IDS Featuring Hurst Parameter Self-Similarity. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Mhamad Bakro, Rakesh Ranjan Kumar, Mohammad Husain, Zubair Ashraf, Arshad Ali, Syed Irfan Yaqoob, Mohammad Nadeem Ahmed, Nikhat Parveen Building a Cloud-IDS by Hybrid Bio-Inspired Feature Selection Algorithms Along With Random Forest Model. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yao Shan, Yu Yao, Xiaoming Zhou, Tong Zhao, Bo Hu, Lei Wang CFL-IDS: An Effective Clustered Federated Learning Framework for Industrial Internet of Things Intrusion Detection. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Caihong Wang, Du Xu, Zonghang Li, Dusit Niyato Effective Intrusion Detection in Highly Imbalanced IoT Networks With Lightweight S2CGAN-IDS. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Bakht Sher Ali, Inam Ullah, Tamara Al Shloul, Izhar Ahmed Khan, Ijaz Khan, Yazeed Yasin Ghadi, Akmalbek Abdusalomov, Rashid Nasimov, Khmaies Ouahada, Habib Hamam ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks. Search on Bibsonomy J. Supercomput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Komal Singh Gill, Sharad Saxena, Anju Sharma NCGTM: A Noncooperative Game-Theoretic Model to Assist IDS in Cloud Environment. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yassine Akhiat, Kaouthar Touchanti, Ahmed Zinedine, Mohamed Chahhou IDS-EFS: Ensemble feature selection-based method for intrusion detection system. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14B. S. Sharmila, Rohini Nagapadma P-DNN: Parallel DNN based IDS framework for the detection of IoT vulnerabilities. Search on Bibsonomy Secur. Priv. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Saleha Saudagar, Rekha Ranawat An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Kaixiang Huang, Jin Wang 0015, Jingru Yang, Ying Yang, Guodong Lu, Yuzhen Chen, Huan Yu, Qifeng Zhang IEFM and IDS: Enhancing 3D environment perception via information encoding in indoor point cloud semantic segmentation. Search on Bibsonomy Neurocomputing The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Mathappan Nivaashini, Suganya Elavarasan, Sountharrajan Sehar, M. Prabu, Durga Prasad Bavirisetti FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system. Search on Bibsonomy EURASIP J. Inf. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Mohammed Sayeeduddin Habeeb, Tummala Ranga Babu Coarse and fine feature selection for Network Intrusion Detection Systems (IDS) in IoT networks. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ryo Shibata, Haruhiko Kaneko Shift-Interleave Coding for DNA-Based Storage: Correction of IDS Errors and Sequence Losses. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Abdullah H. Alqahtani An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ryan Guide, Eric Pauley, Yohan Beugin, Ryan Sheatsley, Patrick D. McDaniel Characterizing the Modification Space of Signature IDS Rules. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Shashwat Khandelwal, Shreejith Shanker A Lightweight FPGA-based IDS-ECU Architecture for Automotive CAN. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Shashwat Khandelwal, Anneliese Walsh, Shanker Shreejith Quantised Neural Network Accelerators for Low-Power IDS in Automotive Networks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Xinchen Zhang, Running Zhao, Zhihan Jiang, Zhicong Sun, Yulong Ding, Edith C. H. Ngai, Shuang-Hua Yang AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Md. Ashraf Uddin 0002, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Samira Kamali Poorazad, Chafika Benzaid, Tarik Taleb Blockchain and Deep Learning-Based IDS for Securing SDN-Enabled Industrial IoT Environments. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Sarah Alharbi, Arshiya Khan Ensemble Defense System: A Hybrid IDS Approach for Effective Cyber Threat Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Md. Ashraf Uddin 0002, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder usfAD Based Effective Unknown Attack Detection Focused IDS Framework. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Partha Ghosh, Joy Sharma, Nilesh Pandey Feature Selection using the concept of Peafowl Mating in IDS. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Shahid Latif, Wadii Boulila, Anis Koubaa, Zhuo Zou, Jawad Ahmad 0001 DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Mohammed Al-Ambusaidi, Zhang Yinjun, Yar Muhammad, Abid Yahya ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications. Search on Bibsonomy Soft Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed Towards an efficient model for network intrusion detection system (IDS): systematic literature review. Search on Bibsonomy Wirel. Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Rohit Dube Faulty use of the CIC-IDS 2017 dataset in information security research. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yanying Wang, Ying Cheng 0001, Qinglin Qi, Fei Tao IDS-KG: An industrial dataspace-based knowledge graph construction approach for smart maintenance. Search on Bibsonomy J. Ind. Inf. Integr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Esra Altulaihan, Mohammed Amin Almaiah, Ahmed Al Guqhaiman Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Moutaz Alazab, Albara W. Awajan, Hadeel Alazzam, Mohammad O. Wedyan, Bandar Alshawi, Ryan Alturki A Novel IDS with a Dynamic Access Control Algorithm to Detect and Defend Intrusion at IoT Nodes. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Akihiro Takai, Yusei Katsura, Nariyoshi Yamai, Rei Nakagawa, Vasaka Visoottiviseth Quick Blocking Operation of IDS/SDN Cooperative Firewall Systems by Reducing Communication Overhead. Search on Bibsonomy ICACT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Wadid Foudhaili, Anouar Nechi, Celine Thermann, Mohammad Al Johmani, Rainer Buchty, Mladen Berekovic, Saleh Mulhem Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach. Search on Bibsonomy ARC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Farhad Mofidi, Sena Hounsinou, Gedare Bloom L-IDS: A Multi-Layered Approach to Ransomware Detection in IoT. Search on Bibsonomy CCWC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Muhammad Bisri Musthafa, Samsul Huda, Ali Md. Arshad, Yuta Kodera, Yasuyuki Nogami Evaluation of IDS model by improving accuracy and reducing overfitting using stacking LSTM. Search on Bibsonomy ICCE The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Shalini Subramani, Munuswamy Selvi Intelligent IDS in wireless sensor networks using deep fuzzy convolutional neural network. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Osamah Shihab Albahri, Mohammed S. Al-Samarraay, Hassan A. AlSattar, Abdullah Hussein Alamoodi, A. A. Zaidan 0001, Ahmed Shihab Albahri, B. B. Zaidan, Ali Najm Jasim Rough Fermatean fuzzy decision-based approach for modelling IDS classifiers in the federated learning of IoMT applications. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Maya Hilda Lestari Louk, Bayu Adhi Tama Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Agustín Lara, Vicente Mayor, Rafael Estepa, Antonio Jose Estepa, Jesús Esteban Díaz Verdejo Smart home anomaly-based IDS: Architecture proposal and case study. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Tarek Gaber, Joseph Bamidele Awotunde, Mohamed Torky, Sunday Adeola Ajagbe, Mohammad Hammoudeh, Wei Li 0109 Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Arnaud Rosay, Eloïse Cheval, Mustapha Ghanmi, Florent Carlier, Pascal Leroux Study of Network IDS in IoT devices. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Hayette Zeghida, Mehdi Boulaiche, Ramdane Chikh Securing MQTT protocol for IoT environment using IDS based on ensemble learning. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed A systematic literature review for network intrusion detection system (IDS). Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Masaki Kobayashi, Yo Kanemoto, Daisuke Kotani, Yasuo Okabe Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities. Search on Bibsonomy J. Inf. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Michael Kubach, Heiko Roßnagel Auf der Suche nach ökonomisch tragfähigen Identitäts-Ökosystemen: Gibt es einen Markt für digitale IDs? Search on Bibsonomy HMD Prax. Wirtsch. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Amirhosein Salehi, Siavash Ahmadi, Mohammad Reza Aref A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach. Search on Bibsonomy ISC Int. J. Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Md. Shafiqul Islam, Muntaha Tasnim, Upama Kabir, Mosarrat Jahan Securing smart home against sinkhole attack using weight-based IDS placement strategy. Search on Bibsonomy IET Wirel. Sens. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Safi Ullah, Jawad Ahmad 0001, Muazzam Ali Khan, Mohammed S. Alshehri, Wadii Boulila, Anis Koubaa, Sana Ullah Jan, M. Munawwar Iqbal Ch TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Arun Kumar Sangaiah, Amir Javadpour, Pedro Pinto 0001 Towards data security assessments using an IDS security model for cyber-physical smart cities. Search on Bibsonomy Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Ghada Abdelmoumin, Danda B. Rawat, Abdul Rahman Studying Imbalanced Learning for Anomaly-Based Intelligent IDS for Mission-Critical Internet of Things. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Marzia Zaman, Darshana Upadhyay, Chung-Horng Lung Validation of a Machine Learning-Based IDS Design Framework Using ORNL Datasets for Power System With SCADA. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Saiyed Rasol Bin Tuan Muda, Mohammad Hafiz Mohd Yusof, Khaled Mofawiz Alfawaz, Mohammed Balfaqih, Abdulrahman Alzahrani New Optimized Adaptive Time Series IDS Classifier Algorithm: Beyond Deep Learning. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Safi Ullah, Wadii Boulila, Anis Koubâa, Jawad Ahmad 0001 MAGRU-IDS: A Multi-Head Attention-Based Gated Recurrent Unit for Intrusion Detection in IIoT Networks. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Ogobuchi Daniel Okey, Dick Carrillo Melgarejo, Muhammad Saadi, Renata Lopes Rosa, João Henrique Kleinschmidt, Demóstenes Zegarra Rodríguez Transfer Learning Approach to IDS on Cloud IoT Devices Using Optimized CNN. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Gwangsik Kim, Byungchul Kim Classification of Functional Types of Lines in P&IDs Using a Graph Neural Network. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Junaid Ahmad Khan, Dae-Woon Lim, Young-Sik Kim A Deep Learning-Based IDS for Automotive Theft Detection for In-Vehicle CAN Bus. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Pradeepkumar Bhale, Debanjan Roy Chowdhury, Santosh Biswas, Sukumar Nandi OPTIMIST: Lightweight and Transparent IDS With Optimum Placement Strategy to Mitigate Mixed-Rate DDoS Attacks in IoT Networks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Izhar Ahmed Khan, Dechang Pi, Muhammad Zahid Abbas, Umar Zia, Yasir Hussain, Hatem Soliman Federated-SRUs: A Federated-Simple-Recurrent-Units-Based IDS for Accurate Detection of Cyber Attacks Against IoT-Augmented Industrial Control Systems. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Fengru Yan, Guanghua Zhang, Dongwen Zhang, Xinghua Sun, Botao Hou, Naiwen Yu TL-CNN-IDS: transfer learning-based intrusion detection system using convolutional neural network. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Nuno Prazeres, Rogério Luís C. Costa, Leonel Santos, Carlos Rabadão Engineering the application of machine learning in an IDS based on IoT traffic flow. Search on Bibsonomy Intell. Syst. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Zhangwei Yu, Yan Liu 0032, Guoqi Xie, Renfa Li, Siming Liu 0001, Laurence T. Yang TCE-IDS: Time Interval Conditional Entropy- Based Intrusion Detection System for Automotive Controller Area Networks. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Bijian Liu Hybrid extreme learning machine-based approach for IDS in smart Ad Hoc networks. Search on Bibsonomy EURASIP J. Wirel. Commun. Netw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Ilhan Firat Kilincer, Turker Tuncer, Fatih Ertam, Abdulkadir Sengür SPA-IDS: An intelligent intrusion detection system based on vertical mode decomposition and iterative feature selection in computer networks. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Angelo Tulumello, Andrea Mayer, Marco Bonola, Paolo Lungaroni, Carmine Scarpitta, Stefano Salsano, Ahmed Abdelsalam, Pablo Camarillo, Darren Dukes, François Clad, Clarence Filsfils Micro SIDs: A Solution for Efficient Representation of Segment IDs in SRv6 Networks. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 2223 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license