The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase intrusion detection (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1986-1992 (15) 1993-1996 (21) 1997-1998 (27) 1999 (85) 2000 (68) 2001 (88) 2002 (129) 2003 (231) 2004 (324) 2005 (488) 2006 (501) 2007 (508) 2008 (561) 2009 (457) 2010 (352) 2011 (304) 2012 (265) 2013 (238) 2014 (247) 2015 (248) 2016 (285) 2017 (355) 2018 (415) 2019 (76)
Publication types (Num. hits)
article(1696) book(14) incollection(51) inproceedings(4424) phdthesis(84) proceedings(19)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3216 occurrences of 1059 keywords

Results
Found 6288 publication records. Showing 6288 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
122Young U. Ryu, Hyeun-Suk Rhee Evaluation of Intrusion Detection Systems Under a Resource Constraint. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF optimal inspection rates, optimal operating points, intrusion detection, Computer security
108Zhuowei Li, Amitabha Das, Jianying Zhou 0001 Model Generalization and Its Implications on Intrusion Detection. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security, Machine Learning, Intrusion Detection, Generalization, Intrusion, Security Infrastructure
104Hervé Debar, Andreas Wespi Aggregation and Correlation of Intrusion-Detection Alerts. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF alert aggregation, alert data model, Intrusion detection, alert correlation
100Marc Dacier, O. Sami Saydjari Special Seminar: Intrusion Detection. Search on Bibsonomy FTCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
97Moon Sun Shin, Kyeong Ja Jeong An Alert Data Mining Framework for Network-Based Intrusion Detection System. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
97Yoshinori Okazaki, Izuru Sato, Shigeki Goto A New Intrusion Detection Method based on Process Profiling. Search on Bibsonomy SAINT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MID, DP matching m, Intrusion Detection, Profile, IDS, AID
96Steven R. Johnston The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF trans-border data flow, intrusion detection. (c) Her Majesty the Queen as represented by the Minister of National Defence, acting on behalf of the Communications Security Establishment, 2001, Privacy, data protection, personal information, personal data, Canada
96Giovanni Vigna, Richard A. Kemmerer, Per Blix Designing a Web of Highly-Configurable Intrusion Detection Sensors. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF STAT, Security, Software Engineering, Intrusion Detection
91Luigi Coppolino, Salvatore D'Antonio, Ivano Alessandro Elia, Luigi Romano From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach. Search on Bibsonomy SEUS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Intrusion Detection and Diagnosis, Information Diversity, Stealthy and non-vulnerability attacks, Ontologies
88Joachim Biskup, Ulrich Flegel Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF audit analysis, purpose binding, privacy, intrusion detection, anonymity, secret sharing, pseudonymity
88Andreas Wespi, Marc Dacier, Hervé Debar Intrusion Detection Using Variable-Length Audit Trail Patterns. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Teiresias, variable-length patterns, C2 audit trail, functionality verification tests, Intrusion detection, pattern matching, pattern discovery
87Robert Gavin Goss, Martin Botha, Rossouw von Solms Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. Search on Bibsonomy SAICSIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF NeGPAIM-W, wireless intrusion detection, intrusion detection, wireless LAN, information technology, information security, computer security, intrusion detection system
85Simon P. Chung, Aloysius K. Mok On Random-Inspection-Based Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random inspection, intrusion detection, computer security, Mimicry attacks
85Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric Measuring intrusion detection capability: an information-theoretic approach. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information-theoretic, intrusion detection, performance measurement
85Dong Seong Kim, Sang Min Lee, Jong Sou Park Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data mining, Intrusion Detection System, Random Forest
85Darren Mutz, Giovanni Vigna, Richard A. Kemmerer An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Software Testing, Intrusion Detection, Traffic Generation, Evasion Attacks
85Magnus Almgren, Ulf Lindqvist Application-Integrated Data Collection for Security Monitoring. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Intrusion detection, application, Web server, module, application-integrated, Apache
81Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade Towards a Theory of Intrusion Detection. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
80Prem Uppuluri, R. Sekar Experiences with Specification-Based Intrusion Detection. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
79Robert K. Cunningham, Craig S. Stevenson Accurately Detecting Source Code of Attacks That Increase Privilege. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Machine Learning, Intrusion Detection, Malicious Code
79Byung-Joo Kim, Il Kon Kim Two-Tier Based Intrusion Detection System. Search on Bibsonomy FSKD (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
79Hong Han 0003, Xianliang Lu, Jun Lu, Bo Chen, Ren Li Yong Data mining aided signature discovery in network-based intrusion detection system. Search on Bibsonomy Operating Systems Review The full citation details ... 2002 DBLP  DOI  BibTeX  RDF network-based intrusion detection, signature discovery, data mining, intrusion detection system
79Jianhua Sun, Hai Jin 0001, Hao Chen 0002, Qian Zhang, Zongfen Han A Compound Intrusion Detection Model. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
77Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
77Junfeng Tian, Tao Liu, Hongqiang Jiao Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF evaluation, network security, intrusion detection system, fuzzy comprehensive evaluation
75A. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF personal IDS, smart card, Intrusion Detection System, IDS, behavioural analysis
75Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer Designing and implementing a family of intrusion detection systems. Search on Bibsonomy ESEC / SIGSOFT FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, intrusion detection, object-oriented frameworks, program families
75Stefan Axelsson The base-rate fallacy and the difficulty of intrusion detection. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF base-rate fallacy, intrusion detection, false alarm rate, detection rate
73Marc G. Welz, Andrew Hutchison Interfacing Trusted Applications with Intrusion Detection Systems. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
73Dominique Alessandri Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
73Alfonso Valdes, Keith Skinner Adaptive, Model-Based Monitoring for Cyber Attack Detection. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Innovative approaches, IDS cooperation, Bayes nets, Intrusion detection
73Byung-Joo Kim, Il Kon Kim Improved Kernel Based Intrusion Detection System. Search on Bibsonomy ICANN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
73Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion detection, Network security, Data visualization, Multivariate data analysis
72Di Yao, Dan Feng 0001 Intrusion Detection for Object-Based Storage System. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
71Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt A Specification-Based Intrusion Detection Model for OLSR. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Specification based IDS, MANET, Mobile ad hoc network, Intrusion Detection, Network Security, Constraints, OLSR
71Xian Rao, Cun-xi Dong, Shao-quan Yang Statistic Learning and Intrusion Detection. Search on Bibsonomy RSFDGrC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF statistic learning intrusion detection network security support vector machines neural network
71Byung-Joo Kim, Il Kon Kim Kernel Based Intrusion Detection System. Search on Bibsonomy ACIS-ICIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
71Byung-Joo Kim, Il Kon Kim Machine Learning Approach to Realtime Intrusion Detection System. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
71Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
71John McHugh Intrusion and intrusion detection. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
71Balaji Rajendran, Dnyanesh Pawar An intelligent contextual support system for intrusion detection tasks. Search on Bibsonomy CHIMIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF contextual support system, intelligent contextual support systems, network security engineer, network security system, intrusion detection, intrusion detection system
70Noria Foukia IDReAM: intrusion detection and response executed with agent mobility architecture and implementation. Search on Bibsonomy AAMAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF intrusion detection and response, mobile agents
70Shaohua Teng, Wei Zhang 0005, Xiufen Fu, Wenwei Tan Cooperative intrusion detection model based on scenario. Search on Bibsonomy CSCWD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
69Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt Formal Reasoning About Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF verification, formal method, Intrusion detection, security policy
69Yang Li 0002, Binxing Fang, Li Guo 0001, You Chen TCM-KNN Algorithm for Supervised Network Intrusion Detection. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF supervised intrusion detection, TCM-KNN algorithm, data mining, machine learning, network security, TCM
69You Chen, Yang Li 0002, Xueqi Cheng, Li Guo 0001 Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF feature selection, intrusion detection, filter, hybrid, wrapper
69Jian Guan, Da-xin Liu, Tong Wang Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems. Search on Bibsonomy ICCSA (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Data Mining, Intrusion Detection, Network Security, Fuzzy Sets
69Liwei Kuang, Mohammad Zulkernine An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion detection systems, Intrusion-tolerance
69Richard A. Kemmerer Designing and implementing a family of intrusion detection systems. Search on Bibsonomy ASE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
69Jaydip Sen, Indranil Sengupta 0001 Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
68Jie Zeng, Tao Li, Guiyang Li, Haibo Li 0003 A New Intrusion Detection Method Based on Antibody Concentration. Search on Bibsonomy ICIC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Antibody concentration, Antigen intrusion intensity, Antigen-antibody reactions, Intrusion detection, False alarm rate, Detection rate
68Geetha Ramachandran, Delbert Hart A P2P intrusion detection system based on mobile agents. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF mobile agents, intrusion detection
68Byung kwan Lee, Seung Hae Yang, Dong-Hyuck Kwon, Dai-Youn Kim PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
68Kofi Nyarko, Tanya Capers, Craig Scott, Kemi Ladeji-Osias Network Intrusion Visualization with NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration. Search on Bibsonomy Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
67Anup K. Ghosh, Christoph C. Michael, Michael Schatz A Real-Time Intrusion Detection System Based on Learning Program Behavior. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
67Lawrence Teo, Yuliang Zheng, Gail-Joon Ahn Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion Detection Force, Internet Scale, Fault Tolerance, Intrusion Detection, Information Sharing, Recovery, Survivability, Infrastructure
67Zhenwei Yu 0001, Jeffrey J. P. Tsai, Thomas J. Weigert An adaptive automatically tuning intrusion detection system. Search on Bibsonomy TAAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, Fuzzy control
67Yongsu Park, Jaeheung Lee, Yookun Cho Intrusion Detection Using Noisy Training Data. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, intrusion detection, anomaly detection, system call
66Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark Green, Miguel Ángel García-Ruíz Toward Sound-Assisted Intrusion Detection Systems. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion detection, computer networks, multimodal interfaces, human-computer interfaces, computer forensics
66Jingtao Yao, Songlun Zhao, Lisa Fan An Enhanced Support Vector Machine Model for Intrusion Detection. Search on Bibsonomy RSKT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF support vector machine, feature selection, Intrusion detection, rough sets
66Sanjay Rawat 0001, Ved Prakash Gulati, Arun K. Pujari A Fast Host-Based Intrusion Detection System Using Rough Set Theory. Search on Bibsonomy Trans. Rough Sets The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Data mining, Intrusion Detection, Rough Set, Decision Table, Anomaly, Misuse
66Glenn A. Fink, Karen F. O'Donoghue, Brett L. Chappell, T. G. Turner A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Security, Evaluation, Real-Time, Intrusion Detection, Metrics, Distributed
66Gil-Han Kim, Hyung-Woo Lee SVM Based False Alarm Minimization Scheme on Intrusion Prevention System. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion Detection/Prevention, Network Security.1, False Alarm, Multi-class SVM
65Hong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion Detection, Principal Component Analysis, Vector Quantization, Multivariate Data Analysis
65Eric Totel, Frédéric Majorczyk, Ludovic Mé COTS Diversity Based Intrusion Detection and Application to Web Servers. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF COTS diversity, Intrusion detection, anomaly detection, design diversity
65Zakia Marrakchi, Ludovic Mé, Bernard Vivinis, Benjamin Morin Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
65Tom Dunigan, Greg Hinkel Intrusion Detection and Intrusion Prevention on a Large Network: A Case Study. Search on Bibsonomy Workshop on Intrusion Detection and Network Monitoring The full citation details ... 1999 DBLP  BibTeX  RDF
65Ning-Qing Sun, Yang Li Intrusion Detection Based on Back-Propagation Neural Network and Feature Selection Mechanism. Search on Bibsonomy FGIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF neural network, feature selection, Intrusion detection, independent component analysis
65Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ad hoc network, Intrusion Detection, Network Security, Formal reasoning
65Frédéric Cuppens, Rodolphe Ortalo LAMBDA: A Language to Model a Database for Detection of Attacks. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
64Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Bayesian network based detection, Missed alarms, Intrusion detection, Event correlation, False alarms
64Myung-Kyu Yi, Chong-Sun Hwang A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion Detection System. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
64Shaohua Teng, Wei Zhang 0005, Xiufen Fu, Naiqi Wu Cooperative Intrusion Detection Model Based on State Transition Analysis. Search on Bibsonomy CSCWD (Selected Papers) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cooperative intrusion detection, Isomorphic transformation, Crucial operation, Scenario, State transition, Topological order
63Mei-Ling Shyu, Thiago Quirino, Zongxing Xie, Shu-Ching Chen, LiWu Chang Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems. Search on Bibsonomy TAAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF adaptive sub-eigenspace modeling (ASEM), agent-based distributed system, intrusion detection, network security, Agent communications
63Chenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer A Stateful Intrusion Detection System for World-Wide Web Servers. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Security, World-Wide Web, Intrusion Detection
62Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang Abstraction-based intrusion detection in distributed environments. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF intrusion detection, heterogeneous systems, Cooperative information systems, misuse detection
62Wenke Lee, Salvatore J. Stolfo A framework for constructing features and models for intrusion detection systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF data mining, intrusion detection, feature construction
62Hai Jin 0001, Jianhua Sun, Hao Chen 0002, Zongfen Han A Risk-Sensitive Intrusion Detection Model. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
62R. Sekar, Y. Guang, S. Verma, T. Shanbhag A High-Performance Network Intrusion Detection System. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
62Jean-Philippe Pouzol, Mireille Ducassé From Declarative Signatures to Misuse IDS. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
62Daniel F. Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid Autonomic Response to Distributed Denial of Service Attacks. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
62Guiling Zhang, Jizhou Sun A Novel Network Intrusion Attempts Prediction Model Based on Fuzzy Neural Network. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion Attempt Prediction, Intrusion Detection, Fuzzy Neural Network
62Peng Ning, Yun Cui, Douglas S. Reeves Constructing attack scenarios through correlation of intrusion alerts. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF intrusion detection, alert correlation, attack scenarios
61Jiong Zhang, Mohammad Zulkernine A Hybrid Network Intrusion Detection Technique Using Random Forests. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hybrid detection, Data mining, Intrusion detection, Network security, Random forests
61Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis Gnort: High Performance Network Intrusion Detection Using Graphics Processors. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF parallel programming, network security, GPU, pattern matching, intrusion detection systems, SIMD
60Bazara I. A. Barry Intrusion detection with OMNeT++. Search on Bibsonomy SimuTools The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion simulation, performance evaluation, intrusion detection, OMNeT++
60Fabian Hugelshofer, Paul Smith 0001, David Hutchison, Nicholas J. P. Race OpenLIDS: a lightweight intrusion detection system for wireless mesh networks. Search on Bibsonomy MobiCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF performance, intrusion detection, wireless mesh network, resource constrained devices
60L. Prema Rajeswari, Arputharaj Kannan, Ramachandran Baskaran An Escalated Approach to Ant Colony Clustering Algorithm for Intrusion Detection System. Search on Bibsonomy ICDCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multiple-level decision tree, Ant colony Clustering, Data Mining, Intrusion Detection
60Sang Hyun Oh, Won Suk Lee Anomaly Intrusion Detection Based on Dynamic Cluster Updating. Search on Bibsonomy PAKDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data Mining, Clustering, Intrusion Detection, Anomaly Detection
60I. V. M. de Lima, Joelson A. Degaspari, João Bosco M. Sobral Intrusion detection through artificial neural networks. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
60F. Abdoli, Mohsen Kahani Using Attacks Ontology in Distributed Intrusion Detection System. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
60Eivind Naess, Deborah A. Frincke, A. David McKinnon, David E. Bakken Configurable Middleware-Level Intrusion Detection for Embedded Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
60Xin Xu, Tao Xie 0005 A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls. Search on Bibsonomy ICIC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
60Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Karl N. Levitt System Health and Intrusion Monitoring Using a Hierarchy of Constraints. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
60Pradeep Kannadiga, Mohammad Zulkernine DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. Search on Bibsonomy SNPD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security and distributed systems, mobile agents, Intrusion detection, distributed attacks
60Jianjing Sun, Han Yang, Jingwen Tian, Fan Wu Intrusion Detection Method Based on Wavelet Neural Network. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
59Amel Meddeb, Yacine Djemaiel, Noureddine Boudriga Global intrusion detection and tolerance in networked systems. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF disk-based intrusion detection, global detection, local detection, tolerance, distributed attacks
59Bazara I. A. Barry, H. Anthony Chan A Hybrid, Stateful and Cross-Protocol Intrusion Detection System for Converged Applications. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Stateful Detection, Cross-protocol Detection, Hybrid Detection, Intrusion Detection, VoIP
59Giovanni Vigna, William K. Robertson, Davide Balzarotti Testing network-based intrusion detection signatures using mutant exploits. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF intrusion detection, security testing, quality metrics
Displaying result #1 - #100 of 6288 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license