The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for intrusion with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1991 (15) 1992-1994 (22) 1995-1996 (19) 1997 (21) 1998 (21) 1999 (101) 2000 (82) 2001 (116) 2002 (179) 2003 (304) 2004 (453) 2005 (612) 2006 (626) 2007 (603) 2008 (674) 2009 (552) 2010 (420) 2011 (377) 2012 (338) 2013 (307) 2014 (319) 2015 (323) 2016 (370) 2017 (441) 2018 (595) 2019 (702) 2020 (790) 2021 (953) 2022 (1105) 2023 (1303) 2024 (309)
Publication types (Num. hits)
article(5186) book(16) data(15) incollection(79) inproceedings(7542) phdthesis(194) proceedings(20)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3828 occurrences of 1280 keywords

Results
Found 13052 publication records. Showing 13052 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23A. Karygiannis, E. Antonakakis, A. Apostolopoulos Detecting Critical Nodes for MANET Intrusion Detection Systems. Search on Bibsonomy SecPerU The full citation details ... 2006 DBLP  DOI  BibTeX  RDF edge-cut, vertex-cut, security, mobile ad hoc network, MANET, intrusion detection, IDS
23Emmanuel Hooper An Intelligent Intrusion Detection and Response System Using Network Quarantine Channels: Adaptive Policies and Alert Filters. Search on Bibsonomy IAT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF autonomy-oriented computing, autonomous knowledge, autonomous auctions and negotiation, intelligent response, intrusion detection, applications, information agents, distributed problem solving, infrastructure security
23Il-Yong Kim, Yoo-Sung Kim, Ki-Chang Kim Zone-Based Clustering for Intrusion Detection Architecture in Ad-Hoc Networks. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion detection architecture, Clustering, Ad-hoc Network
23A. H. M. Rezaul Karim, R. M. A. P. Rajatheva, Kazi M. Ahmed An efficient collaborative intrusion detection system for MANET using Bayesian Approach. Search on Bibsonomy MSWiM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MANET, intrusion detection system, Bayesian approach
23Jianhua Yang, Shou-Hsuan Stephen Huang, Ming Dong Wan A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF clustering, intrusion detection, Network security, partitioning, round-trip time, stepping-stone
23Jianhua Yang, Byong Lee, Yongzhong Zhang Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF intrusion detection, Network security, round-trip time, stepping-stone
23Mathew Graves, Mohammad Zulkernine Bridging the gap: software specification meets intrusion detector. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack languages, intrusion detection, software security, software specification
23Monther Aldwairi, Thomas M. Conte, Paul D. Franzon Configurable string matching hardware for speeding up intrusion detection. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF snort accelerator, string matchin, intrusion detection
23Byoung Min Joon Intrusion-Tolerant Server Architecture for Survivable Services. Search on Bibsonomy J. Supercomput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF replicated server architecture, survivability, voting, intrusion-tolerance
23Dong Yu 0001, Deborah A. Frincke Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF alert confidence fusion, hidden colored Petri-Net, intrusion detection system, alert correlation, Dempster-Shafer theory of evidence
23Larry Lee Reynolds Jr., Richard W. Tibbs, E. Joseph Derrick A GUI for intrusion detection and related experiences. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF intrusion detection, snort, NIDS
23John R. Goodall, A. Ant Ozok, Wayne G. Lutters, Penny Rheingans, Anita Komlodi A user-centered approach to visualizing network traffic for intrusion detection. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information visualization, intrusion detection, network security, user-centered design, usability testing
23Patrick LaRoche, Nur Zincir-Heywood 802.11 network intrusion detection using genetic programming. Search on Bibsonomy GECCO Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF genetic programming, intrusion detection, denial of service, 802.11, WiFi
23Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection. Search on Bibsonomy SNPD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF misuse intrusion detection, support-confidence framework, genetic algorithms, software development, Information assurance
23Mei-Ling Shyu, Kanoksri Sarinnapakorn, Indika Kuruppu-Appuhamilage, Shu-Ching Chen, LiWu Chang, Thomas Goldring Handling Nominal Features in Anomaly Intrusion Detection Problems. Search on Bibsonomy RIDE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF indicator variables, multiple correspondence analysis, nominal features, principal component classifier, intrusion detection, Anomaly detection
23Juan Jose García Adeva, Juan Manuel Pikatza, S. Flórez, Francisco Javier Sobrado Intrusion Detection Using Text Mining in a Web-Based Telemedicine System. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Web Intrusion Detection, Machine Learning, Text Mining, Telemedicine
23Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford Virtual Playgrounds for Worm Behavior Investigation. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion Observation and Analysis, Destructive Experiments, Internet Worms
23Christian Kreibich, Jon Crowcroft Honeycomb: creating intrusion detection signatures using honeypots. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF longest-common-substring algorithms, traffic signatures, suffix trees, honeypots, network intrusion detection, protocol analysis, pattern detection
23Rong-Tai Liu, Nen-Fu Huang, Chih-Hao Chen, Chia-Nan Kao A fast string-matching algorithm for network processor-based intrusion detection system. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network, Intrusion detection, pattern matching, processor
23Javed A. Aslam, Sergey Bratus, David Kotz, Ronald A. Peterson, Brett Tofel, Daniela Rus The Kerf Toolkit for Intrusion Analysis. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF log alerts, attack forensics, remote logging, Intrusion analysis
23Yuanbo Guo, Jianfeng Ma 0001 An intrusion-tolerant authorization and authentication scheme in distributed environments. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authorization and authentication, intrusion-tolerant, verifiable secret sharing
23Tomás E. Uribe, Steven Cheung Automatic analysis of firewall and network intrusion detection system configurations. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF formal specification and analysis, network configuration and security, firewalls, network intrusion detection
23Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer Operational experiences with high-volume network intrusion detection. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF bro, security, evaluation, network intrusion detection
23John Zhong Lei, Ali A. Ghorbani 0001 Network Intrusion Detection Using an Improved Competitive Learning Neural Network. Search on Bibsonomy CNSR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Arti.cial Neural Network, Data Mining, Network Security, Network Intrusion Detection, Competitive Learning
23John R. Goodall, Wayne G. Lutters, Anita Komlodi I know my network: collaboration and expertise in intrusion detection. Search on Bibsonomy CSCW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF intrusion detection, information security, field study, expertise
23Wen-Chuan Hsieh, Chi-Chun Lo, Jing-Chi Lee, Li-Tsung Huang The Implementation of a Proactive Wireless Intrusion Detection System. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Wireless Intrusion Detection System (WIDS), Wired Equivalent Privacy (WEP), 802.11, Short Message Service (SMS), Wireless Local Area Network (WLAN)
23Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos, Michalis Polychronakis Performance Analysis of Content Matching Intrusion Detection Systems. Search on Bibsonomy SAINT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF workload characterization and generation, security, intrusion detection
23Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos Generating realistic workloads for network intrusion detection systems. Search on Bibsonomy WOSP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF workload characterization and generation, security, intrusion detection
23Benjamin Jack Culpepper, H. Chris Tseng Sinkhole Intrusion Indicators in DSR MANETs. Search on Bibsonomy BROADNETS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF sinkhole, MANET, fuzzy logic, intrusion detection, DSR
23Avrim Blum, Dawn Xiaodong Song, Shobha Venkataraman Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Random walks, Network intrusion detection, Stepping stones, Evasion, Interactive sessions
23Ruiqi Hu, Aloysius K. Mok Detecting Unknown Massive Mailing Viruses Using Proactive Methods. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF malicious executable detection, intrusion detection, virus detection
23Robin Sommer, Vern Paxson Enhancing byte-level network intrusion detection signatures with context. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF bro, security, evaluation, pattern matching, signatures, network intrusion detection, snort
23Chinyang Henry Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl N. Levitt A specification-based intrusion detection system for AODV. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF specification-based detection, MANET, intrusion detection, network monitor, AODV, P2P network
23Xunhua Wang, Mohammad Hossain Heydari, Hua Lin An Intrusion-Tolerant Password Authentication System. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF off-line dictionary attack, password-authenticated key exchange (PAKE), Intrusion tolerance
23Frédéric Cuppens, Alexandre Miège Alert Correlation in a Cooperative Intrusion Detection Framework. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cooperative Intrusion Detection, IDMEF, Alert Merging, Alert Correlation
23Kwong H. Yung Detecting Long Connection Chains of Interactive Terminal Sessions. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF connection chain, terminal session, delayed acknowledgment, reply echo, echo delay, intrusion detection, network security, computer security, network protocol, Stepping stone
23Frédéric Cuppens Managing Alerts in a Multi-Intrusion Detection Environmen. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF IDMEF, cooperative intrusion detection, alert clustering, alert merging, IDS, DTD
23Josué Kuri, Gonzalo Navarro 0001 Fast Multipattern Search Algorithms for Intrusion Detection. Search on Bibsonomy SPIRE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF fast multi-pattern search algorithms, pattern occurrence detection, spurious text characters, search state representation, machine word, search state updating, spurious characters, intrusion detection, search problems
23Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee, Ronald A. Olsson A Methodology for Testing Intrusion Detection Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF computer user simulation, software testing, Intrusion detection, computer security
22Shu Chen, Yingying Chen 0001, Wade Trappe Exploiting environmental properties for wireless localization. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee Alert propagation in mobile ad hoc networks. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Xiantao Zhang, Qi Li 0002, Sihan Qing, Huanguo Zhang VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Charles R. Haag, Gary B. Lamont, Paul D. Williams, Gilbert L. Peterson An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions. Search on Bibsonomy ICARIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Surat Srinoy Integration Soft Computing Approach to Network Security. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li Assessing Attack Threat by the Probability of Following Attacks. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Vladimir A. Golovko, Leanid U. Vaitsekhovich, Pavel A. Kochurko, Uladzimir S. Rubanau Dimensionality Reduction and Attack Recognition using Neural Network Approaches. Search on Bibsonomy IJCNN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Mohammed Hussein, Mohammad Zulkernine UMLintr: A UML Profile for Specifying Intrusions. Search on Bibsonomy ECBS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Huei-Wen Ferng, Chien-Liang Liu Design of a Joint Defense System for Mobile Ad Hoc Networks. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Paulo Veríssimo Thou Shalt Not Trust non-Trustworthy Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Zhaoyu Liu, Roopesh Uppala A Dynamic Countermeasure Method for Large-Scale Network Attacks. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Wu Yang 0001, Xiao-chun Yun, Jianhua Li 0001 An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers. Search on Bibsonomy APWeb Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Tzi-cker Chiueh, Dhruv Pilania Design, Implementation, and Evaluation of a Repairable Database Management System. Search on Bibsonomy ICDE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Tzi-cker Chiueh, Dhruv Pilania Design, Implementation, and Evaluation of A Repairable Database Management System. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Miguel Correia 0001, Nuno Ferreira Neves, Paulo Veríssimo How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. Search on Bibsonomy SRDS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Sotiris E. Nikoletseas, Grigorios Prasinos, Paul G. Spirakis, Christos D. Zaroliagis Attack Propagation in Networks. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Sang-Jun Han, Sung-Bae Cho Combining Multiple Host-Based Detectors Using Decision Tree. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2003 DBLP  DOI  BibTeX  RDF combining detectors, decision tree, anomaly detection
22Hee Suk Seo, Tae Ho Cho Modeling and Simulation for Detecting a Distributed Denial of Service Attack. Search on Bibsonomy Australian Joint Conference on Artificial Intelligence The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto Editorial. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Joseph Betser The Challenge of Creating Productive Collaborating Information Assurance Communities via Internet Research and Standards. Search on Bibsonomy SRDS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Laurent George 0002, Valérie Viet Triem Tong, Ludovic Mé Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Natalia Stakhanova, Chris Strasburg, Samik Basu 0001, Johnny S. Wong On Evaluation of Response Cost for Intrusion Response Systems. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer Predicting the Resource Consumption of Network Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Ashish Kamra, Elisa Bertino Database Intrusion Detection and Response. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Matthias Vallentin, Robin Sommer, Jason Lee 0001, Craig Leres, Vern Paxson, Brian Tierney The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Ke Wang 0009, Salvatore J. Stolfo Anomalous Payload-Based Network Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Tadeusz Pietraszek Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Jeffrey Undercoffer, Anupam Joshi, John Pinkston Modeling Computer Attacks: An Ontology for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Sung-Bae Cho, Sang-Jun Han Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF privilege flow, combining multiple models, hidden Markov model, anomaly detection
21Lambert Schaelicke, Thomas Slabach, Branden J. Moore, Curt Freeland Characterizing the Performance of Network Intrusion Detection Sensors. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Christopher Krügel, Thomas Toth Using Decision Trees to Improve Signature-Based Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Mike Hall, Kevin Wiley Capacity Verification for High Speed Network Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Jacob Zimmermann, Ludovic Mé, Christophe Bidan Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information theft detection, Intrusion detection, information theory, malware analysis
21Liberios Vokorokos, Anton Baláz, Martin Chovanec Distributed Detection System of Security Intrusions Based on Partially Ordered Events and Patterns. Search on Bibsonomy Towards Intelligent Engineering and Information Technology The full citation details ... 2009 DBLP  DOI  BibTeX  RDF partially ordered events, distributed system, architecture, sensor, patterns, intrusion detection system
21François Trousset, Pascal Poncelet, Florent Masseglia SAX: a privacy preserving general pupose methodapplied to detection of intrusions. Search on Bibsonomy CIKM-PAVLAD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF collaborative organizations, privacy, intrusion detection
21Frank Akujobi, Ioannis Lambadaris, Evangelos Kranakis An integrated approach to detection of fast and slow scanning worms. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF detection interval, intrusion detection, anomaly detection, Bayesian inference, worms, probability model
21Sebastian Schmerl, Michael Vogel, Hartmut König Identifying Modeling Errors in Signatures by Model Checking. Search on Bibsonomy SPIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Attack Signatures, Intrusion Detection, Computer Security, Signature Verification, Misuse Detection, Promela, Spin model checker
21Gilbert L. Peterson, Christopher B. Mayer, Thomas L. Kubler Ant clustering with locally weighted ant perception and diversified memory. Search on Bibsonomy Swarm Intell. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ant clustering, Locally weighted regression, Intrusion detection system
21Chetan Parampalli, R. Sekar 0001, Rob Johnson A practical mimicry attack against powerful system-call monitors. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack
21Álvaro Herrero 0001, Emilio Corchado Traffic Data Preparation for a Hybrid Network IDS. Search on Bibsonomy HAIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hybrid Artificial Intelligence Systems, Artificial Intelligence, Artificial Neural Networks, Unsupervised Learning, Network Intrusion Detection, Computer Network Security, Projection Methods
21Florian Kerschbaum Distance-preserving pseudonymization for timestamps and spatial data. Search on Bibsonomy WPES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, hash functions, pseudonymization, distributed intrusion detection
21Ghassan Kbar, Wathiq Mansoor Securing the Wireless LANs Against Internal Attacks. Search on Bibsonomy MSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF intrusion detection & prevention, rogue DHCP, security, wireless, rogue AP
21Julien Bourgeois, Abdoul Karim Ganame, Igor V. Kotenko, Alexander Ulanov Software Environment for Simulation and Evaluation of a Security Operation Center. Search on Bibsonomy IF&GIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security modeling and simulation, intrusion detection, DDoS, infrastructure security
21Tsong Song Hwang, Tsung-Ju Lee, Yuh-Jye Lee A three-tier IDS via data mining approach. Search on Bibsonomy MineNet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF KDD'99, RIPPER, activity profile, whitelist, intrusion detection system, blacklist, false alarm rate, multiclass SVMs
21James J. Treinen, Ramakrishna Thurimella Application of the PageRank Algorithm to Alarm Graphs. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Watch Lists, Alarm Graphs, Intrusion Detection, PageRank, Security Visualization
21Asia Slowinska, Herbert Bos The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attack analysis, honeypots, intrusion detection and prevention
21Cheng-Fa Tsai, Chia-Chen Yen Unsupervised Anomaly Detection Using HDG-Clustering Algorithm. Search on Bibsonomy ICONIP (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF unsupervised anomaly detection, data mining, intrusion detection, anomaly detection, data clustering
21Prahlad Fogla, Wenke Lee q-Gram Matching Using Tree Models. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF q{hbox{-}}{rm gram} matching, Intrusion detection, pattern matching, trees, string matching, search problems, suffix tree, tree data structure, word processing
21Nong Ye, Toni Farley, Deepak Lakshminarasimhan An attack-norm separation approach for detecting cyber attacks. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Computer and network security, Intrusion detection, Signal processing, Signal detection, Cyber attacks
21Mauro Silva, Denivaldo Lopes, Zair Abdelouahab A Remote IDS Based on Multi-Agent Systems, Web Services and MDA. Search on Bibsonomy ICSEA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Software security privacy, metadata repository, agents, intrusion detection, Model-Driven Architecture
21Paulo Sousa 0001, Nuno Ferreira Neves, Paulo Veríssimo Proactive resilience through architectural hybridization. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secret sharing, intrusion tolerance, proactive recovery
21Danny Dhillon, Jerry Zhu, John Richards, Tejinder S. Randhawa Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multipoint relay (MPR), optimized link state routing (OLSR), routing protocol integrity, security, mobile ad-hoc networks (MANET), IP, intrusion detection systems (IDS)
21J. Lane Thames, Randal T. Abler, Ashraf Saad Hybrid intelligent systems for network security. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF self-organizing map, intrusion detection systems, Bayesian learning, hybrid-intelligent systems
21Kazimierz Kowalski, Mohsen Beheshti Analysis of Log Files Intersections for Security Enhancement. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data Mining, Security architectures, Intrusion prevention, Log files
21Angel Grediaga Olivo, Francisco Ibarra, Federico García, Bernardo Ledesma Latorre, Francisco Brotóns Application of Neural Networks in Network Control and Information Security. Search on Bibsonomy ISNN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF self organizative map, neural networks, intrusion detection system, perceptron
21Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001 Simplifying Signature Engineering by Reuse. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attack Signatures, Intrusion Detection, Computer Security, Misuse Detection
21Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak Intelligent Network-Based Early Warning Systems. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi agent systems, intrusion detection, critical infrastructures, early warning system
21In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won Information System Modeling for Analysis of Propagation Effects and Levels of Damage. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Damage propagation, Safeguard, Risk analysis, Intrusion, Epidemic
21Carla Marceau, Matthew Stillerman Modular Behavior Profiles in Systems with Shared Libraries (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF dynamic link libraries, intrusion detection, Anomaly detection, shared libraries, behavior profile
21Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannaccone Approximate fingerprinting to accelerate pattern matching. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF intrusion detection, pattern matching, fingerprint, deep packet inspection
Displaying result #901 - #1000 of 13052 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license