Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
199 | Tangjianfeng, Huangxianbin, Wangjicheng |
Research of mainframe CICS application integration using CICS SCA. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
SOA, integration, SCA, CICS, mainframe |
105 | Nandita Chaudhri, Shefali S. Dash |
Community information centers: e-governance at subdistrict level: a case study. |
ICEGOV |
2007 |
DBLP DOI BibTeX RDF |
citizen services, internet kiosks, permanent account number (PAN), telecentres, education, e-governance, IT, entertainment, information services |
84 | Shefali S. Dash, Nandita Chaudhri |
Community information centres---enabling e-governance in India: lessons learnt. |
ICEGOV |
2008 |
DBLP DOI BibTeX RDF |
citizen services, internet kiosks, tele-centres, education, e-governance, entertainment, information services |
65 | Leo Freitas, Konstantinos Mokos, Jim Woodcock 0001 |
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository. |
ICECCS |
2007 |
DBLP DOI BibTeX RDF |
|
63 | Kun Lu, Fengqi Li, Jizhen Niu, Ling Xie |
Design and Realization of High-Reliability Courses Selection System Based on Mainframe. |
CSSE (5) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Alex Sellink, Chris Verhoef, Harry M. Sneed |
Restructuring of COBOL/CICS Legacy Systems. |
CSMR |
1999 |
DBLP DOI BibTeX RDF |
Teleprocessing system, Control-flow normalization, Repartitioning, Reengineering, COBOL, Transaction processing system, System renovation, Remodularization, CICS |
50 | Kenneth Fussichen |
Ada and CICS: or (yes! Ada can be done on an IBM Mainframe). |
TRI-Ada |
1992 |
DBLP DOI BibTeX RDF |
Ada, CICS |
47 | |
2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014 |
CICS |
2014 |
DBLP BibTeX RDF |
|
47 | Eray Balkanli, Jander Alves, Nur Zincir-Heywood |
Supervised learning to detect DDoS attacks. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Khalid Shahbar, Nur Zincir-Heywood |
Benchmarking two techniques for Tor classification: Flow level and circuit level classification. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Sebastian Obermeier 0001, Michael Wahler, Thanikesavan Sivanthi, Roman Schlegel, Aurelien Monot |
Automatic attack surface reduction in next-generation industrial control systems. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Foaad Khosmood, Phillip L. Nico, Jonathan Woolery |
User identification through command history analysis. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Mohiuddin Solaimani, Mohammed Iftekhar, Latifur Khan, Bhavani Thuraisingham, Joey Burton Ingram |
Spark-based anomaly detection over multi-source VMware performance data in real-time. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Ugur Pehlivan, Nuray Baltaci, Cengiz Acartürk, Nazife Baykal |
The analysis of feature selection methods and classification algorithms in permission based Android malware detection. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
47 | El-Sayed M. El-Alfy, Ali A. Al-Hasan |
A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Carlos A. S. Assis, Adriano César Machado Pereira, Marconi de Arruda Pereira, Eduardo G. Carrano |
A genetic programming approach for fraud detection in electronic transactions. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Arisoa S. Randrianasolo, Larry D. Pyeatt |
A theoretical Q-learning temporary security repair. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili 0001 |
Quantifying the impact of unavailability in cyber-physical environments. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Karel P. Bergmann, Jörg Denzinger |
Automated testing for cyber threats to ad-hoc wireless networks. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Dipankar Dasgupta, Denise Ferebee, Sanjib Kumar Saha, Abhijit Kumar Nag, Kul Prasad Subedi, Alvaro Madero, Abel Sanchez, John R. Williams |
G-NAS: A grid-based approach for negative authentication. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
47 | El-Sayed M. El-Alfy, Asem A. Ghaleb |
Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
47 | |
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore |
CICS |
2013 |
DBLP BibTeX RDF |
|
47 | Hossein Rahimi, Nur Zincir-Heywood, Bharat Gadher |
Indoor geo-fencing and access control for wireless networks. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Kesav Kancherla, Srinivas Mukkamala |
Image visualization based malware detection. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Sanjay Rawat 0001, Fabien Duchene, Roland Groz, Jean-Luc Richier |
Evolving indigestible codes: Fuzzing interpreters with genetic programming. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Hector M. Lugo-Cordero, Ratan K. Guha |
What defines an intruder? An intelligent approach. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Mahendra Piraveenan, Shahadat Uddin, Kon Shing Kenneth Chung, Dharshana Kasthurirathna |
Quantifying encircling behaviour in complex networks. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Marcos Álvares Barbosa Junior, Tshilidzi Marwala, Fernando Buarque de Lima Neto |
Applications of computational intelligence for static software checking against memory corruption vulnerabilities. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Simon Miller, Jonathan M. Garibaldi, Susan Appleby |
Evolving OWA operators for cyber security decision making problems. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
47 | S. Ganesh Babu, Ilango Paramasivam |
Higher dimensional chaos for Audio encryption. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta |
Resilient hybrid overlay model for smart grid: RHM for smart grid. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Chirag Modi 0001, Dhiren R. Patel |
A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
47 | |
2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011 |
CICS |
2011 |
DBLP BibTeX RDF |
|
47 | Robert K. Abercrombie, Erik M. Ferragut, Frederick T. Sheldon, Michael R. Grimaila |
Addressing the need for independence in the CSE model. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Scott Musman, Mike Tanner, Aaron Temin, Evan Elsaesser, Lewis Loren |
A systems engineering approach for crown jewels estimation and mission assurance decision making. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Anita Zakrzewska, Erik M. Ferragut |
Modeling cyber conflicts using an extended Petri Net formalism. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Erik M. Ferragut, David M. Darmon, Craig Aaron Shue, Stephen Kelley |
Automatic construction of anomaly detectors from graphical models. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Ran Liu, Wenjian Luo, Xufa Wang |
A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Justin M. Beaver, Robert M. Patton, Thomas E. Potok |
An approach to the automated determination of host information value. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Amal Ben Hamida, Mohamed Koubàa, Chokri Ben Amar, Henri Nicolas |
Hierarchical traceability of multimedia documents. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Yi Hu, Charles E. Frank, James Walden, Emily Crawford, Dhanuja Kasturiratna |
Profiling file repository access patterns for identifying data exfiltration activities. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Paul K. Harmer, Ryan W. Thomas, Brady Christel, Richard K. Martin, Clifton Watson |
Wireless security situation awareness with attack identification decision support. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | James L. Miller, Robert F. Mills, Michael R. Grimaila, Michael W. Haas |
A scalable architecture for improving the timeliness and relevance of cyber incident notifications. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Justin Zhan, Xing Fang, Peter Killion |
Trust optimization in task-oriented social networks. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Omar Al-Ibrahim, Suku Nair |
Security fusion based on state machine compositions. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Harkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva |
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Stephen M. Woskov, Michael R. Grimaila, Robert F. Mills, Michael W. Haas |
Design considerations for a case-based reasoning engine for scenario-based cyber incident notification. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Dean Lee, Samuel N. Hamilton, Wendy L. Hamilton |
Modeling Cyber Knowledge uncertainty. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Sara Hajian, Josep Domingo-Ferrer, Antoni Martínez-Ballesté |
Discrimination prevention in data mining for intrusion and crime detection. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Martin Rehák, Jan Stiborek, Martin Grill |
Intelligence, not integration: Distributed regret minimization for IDS Control. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Senhua Yu, Dipankar Dasgupta |
An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Justin Zhan, Lijo Thomas |
Phishing detection using stochastic learning-based weak estimators. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Justin Zhan, Xing Fang, Naveen Bandaru |
Location privacy protection on social networks. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Jennifer T. Jackson, Sadie Creese, Mark S. Leeson |
Biodiversity: A security approach for ad hoc networks. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | David L. Hancock, Gary B. Lamont |
Multi agent systems on military networks. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi, Sukumar Nandi |
A host based DES approach for detecting ARP spoofing. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, Qishi Wu |
Security visualization: Cyber security storm map and event correlation. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Carlos Bacquet, Nur Zincir-Heywood, Malcolm I. Heywood |
Genetic optimization and hierarchical clustering applied to encrypted traffic identification. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Patrick LaRoche, Nur Zincir-Heywood, Malcolm I. Heywood |
Exploring the state space of an application protocol: A case study of SMTP. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Ondrej Linda, Milos Manic, Todd Vollmer, Jason L. Wright |
Fuzzy logic based anomaly detection for embedded network security cyber sensor. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Todd Vollmer, Jim Alves-Foss, Milos Manic |
Autonomous rule creation for intrusion detection. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
47 | |
2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009 |
CICS |
2009 |
DBLP BibTeX RDF |
|
47 | Masanoei Hara, Akira Yamada 0001, Yutaka Miyake |
Visual similarity-based phishing detection without victim site information. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Hoin Kim, Inyong Lee, Jaeik Cho, Jongsub Moon |
Visualization of network components for attack analysis. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, Steven K. Rogers |
Using qualia and multi-layered relationships in malware detection. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Suvasini Panigrahi, Shamik Sural, Arun K. Majumdar |
Detection of intrusive activity in databases by combining multiple evidences and belief update. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Qishi Wu, Denise Ferebee, Yunyue Lin, Dipankar Dasgupta |
Visualization of security events using an efficient correlation technique. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Eric S. Imsand, Deon Garrett, John A. Hamilton Jr. |
User identification using GUI manipulation patterns and artificial neural networks. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Li Yang 0001, Feiqiong Liu, Joseph M. Kizza, Raimund K. Ege |
Discovering topics from dark websites. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Joseph A. Brown, Sheridan K. Houghten, Beatrice M. Ombuki-Berman |
Genetic algorithm cryptanalysis of a substitution permutation network. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Nikolaos Chatzis, Radu Popescu-Zeletin, Nevil Brownlee |
Email worm detection by wavelet analysis of DNS query streams. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Dipankar Dasgupta |
Tutorial: computational intelligence in cyber security. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka |
Generating mimicry attacks using genetic programming: A benchmarking study. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Siddharth Gujral, Estefan Ortiz, Vassilis L. Syrmos |
An unsupervised method for intrusion detection using spectral clustering. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Sourour Meharouech, Adel Bouhoula, Tarek Abbes |
Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Eric M. Holloway, Gary B. Lamont, Gilbert L. Peterson |
Network security using self organized multi agent swarms. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Chet Langin, Hongbo Zhou 0001, Shahram Rahimi 0001, Bidyut Gupta, Mehdi R. Zargham, Mohammad R. Sayeh |
A self-organizing map and its modeling for discovering malignant network traffic. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Stephen Torri, Winard Britt, John A. Hamilton Jr. |
A compiler classification framework for use in reverse engineering. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Jiang Bian 0001, Remzi Seker |
JigDFS: A secure distributed file system. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Manhyun Chung, Jaeik Cho, Jongsub Moon |
An effective denial of service detection method using kernel based data. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Archana Bhattarai, Vasile Rus, Dipankar Dasgupta |
Characterizing comment spam in the blogosphere through content analysis. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Minsoo Lee, Xiaohui Ye, Samuel D. Johnson, Dan Marconett, Chaitanya S. K. Vadrevu, Rao Vemuri 0001, S. J. Ben Yoo |
Cognitive security management with reputation based cooperation schemes in heterogeneous networks. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili 0001 |
Managing complex IT security processes with value based measures. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Ran Tao, Li Yang 0001, Lu Peng 0001, Bin Li 0008, Alma Cemerlic |
A case study: Using architectural features to improve sophisticated denial-of-service attack detections. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Riyad Alshammari, Nur Zincir-Heywood |
Generalization of signatures for SSH encrypted traffic identification. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Ochul Kwon, Seongjae Bae, Jaeik Cho, Jongsub Moon |
Study of fuzzy clustering methods for malicious codes using native API call frequency. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Sahin Renckes, Huseyin Polat 0001, Yusuf Oysal |
Finding the state sequence maximizing P(O; I|λ) on distributed HMMs with Privacy. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Rajesh Kumar Pal, Indranil Sengupta 0001 |
Enhancing file data security in linux operating system by integrating secure file system. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Fred Stefan, Paul Herrmann 0001, Wilhelm G. Spruth |
Was geschrieben ist, ist geschrieben - Legacy CICS-Anwendungen im neuen Gewand (What is written, is written - Modern Legacy CICS-Applications). |
it Inf. Technol. |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Ted C. Keller |
CPU Usage in CICS/ESA and CICS/MVS Measures, Meanings, and Applications. |
Int. CMG Conference |
1992 |
DBLP BibTeX RDF |
|
47 | H. W. Barry Merrill |
Performance Evaluation of CICS Using SAS and the CICS Performance Analyzer Data. |
Int. CMG Conference |
1979 |
DBLP BibTeX RDF |
|
44 | Johanna Ekua Awotwi, George Owusu |
Ghana's community information centers (CiCs): e-governance success or mirage? |
ICEGOV |
2009 |
DBLP DOI BibTeX RDF |
community information centres, telecentres, e-governance, digital divide, mobile telephony, illiteracy |
44 | Tang Jianfeng, Zhang Xianing |
Mainframe Application Transition to SOA Environment Using CICS Service Flow Feature. |
CSSE (2) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Jonathan Hoare, Jeremy Dick, David Neilson, Ib Holm Sørensen |
Applying the B Technologies on CICS. |
FME |
1996 |
DBLP DOI BibTeX RDF |
|
44 | Hilton Chen, Wayne Summers |
IBM 3270 full screen interactive programming without CICS. |
SIGCSE |
1988 |
DBLP DOI BibTeX RDF |
COBOL |
42 | C. Mohan 0001 |
Tutorial: application servers and associated technologies. |
SIGMOD Conference |
2002 |
DBLP DOI BibTeX RDF |
Java, XML |
27 | Marc Beyerle, Joachim Franz, Wilhelm G. Spruth |
Persistent Reusable Java Virtual Machine unter z/OS und Linux. |
Inform. Forsch. Entwickl. |
2005 |
DBLP DOI BibTeX RDF |
ACID, Persistent Reusable Java Virtual Machine, PRJVM, OS/390, Serial Reusability, zLinux, z/OS, zSeries, Transaction, JVM, IMS, J2EE, DB2, EJB, WebSphere, CICS |
27 | Olaf Zimmermann, Sven Milinski, Michael Craes, Frank Oellermann |
Second generation web services-oriented architecture in production in the finance industry. |
OOPSLA Companion |
2004 |
DBLP DOI BibTeX RDF |
core banking, web services, XML, service-oriented architecture, software architecture, compression, web application, business process, HTTP, XML schema, SOAP, enterprise application integration, WSDL, application server, UDDI, webSphere, CICS |
27 | Harry M. Sneed |
Generation of Stateless Components from Procedural Programs for Reuse in a Distributed System. |
CSMR |
2000 |
DBLP DOI BibTeX RDF |
Stateless Components, Host Networking, Reengineering, Intranet, COBOL, Client/Server, Wrapping, CICS |
27 | J. H. Chang, H. H. Chao, K. Lewis, M. Holland |
Control store implementation of a high performance VLSI CISC. |
MICRO |
1988 |
DBLP BibTeX RDF |
CICS/VS |