The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for IDS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1992 (34) 1993-1994 (22) 1995-1996 (22) 1997-1999 (16) 2000 (17) 2001 (26) 2002 (42) 2003 (49) 2004 (84) 2005 (143) 2006 (162) 2007 (158) 2008 (145) 2009 (120) 2010 (55) 2011 (28) 2012 (41) 2013 (41) 2014 (32) 2015 (36) 2016 (99) 2017 (28) 2018 (106) 2019 (114) 2020 (116) 2021 (110) 2022 (158) 2023 (173) 2024 (46)
Publication types (Num. hits)
article(491) book(2) data(3) incollection(6) inproceedings(1707) phdthesis(4) proceedings(10)
Venues (Conferences, Journals, ...)
BigDataSecurity/HPSC/IDS(307) CoRR(88) IDS(63) BigDataSecurity(36) IEEE Access(29) RAID(27) Comput. Secur.(16) ACSAC(15) AINA(14) IWCMC(14) ICC(13) ISI(13) Recent Advances in Intrusion D...(12) SAINT(10) Sensors(10) ARES(9) More (+10 of total 934)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1161 occurrences of 620 keywords

Results
Found 2227 publication records. Showing 2223 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
125Safaa Zaman, Fakhri Karray Lightweight IDS Based on Features Selection and IDS Classification Scheme. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
95Xin Jin, Yaoxue Zhang, Yue-Zhi Zhou, Yaya Wei A Novel IDS Agent Distributing Protocol for MANETs. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
87Sebastian Roschke, Feng Cheng 0002, Christoph Meinel An Extensible and Virtualization-Compatible IDS Management Architecture. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
84N. Subramanian, Pramod S. Pawar, Mayank Bhatnagar, Nihar S. Khedekar, Srinivas Guntupalli, N. Satyanarayana, V. K. Vijaykumar, Praveen D. Ampatt, Rajiv Ranjan, Prasad J. Pandit Development of a Comprehensive Intrusion Detection System - Challenges and Approaches. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Challenges in IDS, IDS Architecture, IDS Standards
80Rodrigo Werlinger, Kirstie Hawkey, Kasia Muldner, Pooya Jaferian, Konstantin Beznosov The challenges of using an intrusion detection system: is it worth the effort? Search on Bibsonomy SOUPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaboration, intrusion detection, usable security, security management, qualitative research, organizational factors, security tools
80Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
79Mauro Silva, Denivaldo Lopes, Zair Abdelouahab A Remote IDS Based on Multi-Agent Systems, Web Services and MDA. Search on Bibsonomy ICSEA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Software security privacy, metadata repository, agents, intrusion detection, Model-Driven Architecture
72Hongjian Li, Ming Xu 0002, Yi Li The Research of Frame and Key Technologies for Intrusion Detection System in IEEE 802.11-based Wireless Mesh Networks. Search on Bibsonomy CISIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
72Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric Measuring intrusion detection capability: an information-theoretic approach. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information-theoretic, intrusion detection, performance measurement
71William H. Allen Mixing Wheat with the Chaff: Creating Useful Test Data for IDS Evaluation. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
69Payas Gupta, Chedy Raïssi, Gérard Dray, Pascal Poncelet, Johan Brissaud SS-IDS: Statistical Signature Based IDS. Search on Bibsonomy ICIW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
65Kenichi Kourai, Shigeru Chiba HyperSpector: virtual distributed monitoring environments for secure intrusion detection. Search on Bibsonomy VEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF inter-VM monitoring, virtual machine, virtual network, distributed IDS
64Dong Yu 0001, Deborah A. Frincke Towards Survivable Intrusion Detection System . Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
63Jungsuk Song, Hiroki Takakura, Yongjin Kwon A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts. Search on Bibsonomy SAINT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
63Sufatrio, Roland H. C. Yap Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
63Nathan Carey, Andrew J. Clark, George M. Mohay IDS Interoperability and Correlation Using IDMEF and Commodity Systems. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Interoperability, Intrusion Detection, Network Management, Correlation, Data Analysis
63Hee Suk Seo, Tae Ho Cho Simulation of Network Security with Collaboration among IDS Models. Search on Bibsonomy Australian Joint Conference on Artificial Intelligence The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
56Liwei Kuang, Mohammad Zulkernine An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion detection systems, Intrusion-tolerance
56Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt Formal Reasoning About Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF verification, formal method, Intrusion detection, security policy
56Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF attack resistant, mobile agents, intrusion detection systems, DoS attacks
56Jia Wang, Insup Lee 0001 Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
56Guangchun Luo, Xianliang Lu, Jiong Li, Jun Zhang MADIDS: a novel distributed IDS based on mobile agent. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF performance, mobile agent, distributed IDS
55Xiantao Zhang, Qi Li 0002, Sihan Qing, Huanguo Zhang VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55Vidar Evenrud Seeberg, Slobodan Petrovic A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Alia Fourati, Khaldoun Al Agha Detecting forged routing messages in ad hoc networks. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF OLSR protocol, Routing vulnerabilities, MANET, IDS, Security services
50Hoda M. Hassan, Mohy Mahmoud, Sherif El-Kassas Securing the AODV protocol using specification-based intrusion detection. Search on Bibsonomy Q2SWinet The full citation details ... 2006 DBLP  DOI  BibTeX  RDF specification-based detection, IDS, network monitoring, AODV
49Julio Gómez, Consolación Gil, Nicolás Padilla, Raul Baños, C. Jiménez Design of a Snort-Based Hybrid Intrusion Detection System. Search on Bibsonomy IWANN (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, Intrusion detection systems, Snort, Network IDS
48Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng Effect of Intrusion Detection on Failure Time of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks. Search on Bibsonomy PRDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasant G. Honavar, Les Miller, Robyn R. Lutz A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. Search on Bibsonomy Requir. Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Software fault tree, Mobile agents, Intrusion detection system, Requirements analysis, Coloured Petri nets
48Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang Performance Adaptation in Real-Time Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Real-time intrusion detection, performance adaptation, optimization, performance metrics
48Steve Jones, Stephen Lundy, Gordon W. Paynter Interactive Document Summarisation Using Automatically Extracted Keyphrases. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
48Danny Dhillon, Jerry Zhu, John Richards, Tejinder S. Randhawa Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multipoint relay (MPR), optimized link state routing (OLSR), routing protocol integrity, security, mobile ad-hoc networks (MANET), IP, intrusion detection systems (IDS)
47Han Qiu 0001, Luna Li, Linghe Kong Message from the Program Chairs IDS 2022. Search on Bibsonomy BigDataSecurity/HPSC/IDS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
47Masayuki Murakami, Nakaji Honda Experimental Investigation of the Fault Tolerance of IDS Models. Search on Bibsonomy FUZZ-IEEE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Mehdi Salour, Xiao Su Dynamic Two-Layer Signature-Based IDS with Unequal Databases. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47A. Karygiannis, K. Robotis, E. Antonakakis Creating Offline MANET IDS Network Traces. Search on Bibsonomy WOWMOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Marko Jahnke, Jens Tölle, Alexander Finkenbrink, Alexander Wenzel, Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini Methodologies and frameworks for testing ids in adhoc networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attacks and attack implementations, hardware testbed, reproducible node motion, semi-virtual testbed, smart MANET jamming, worm hole, black hole
47Masayuki Murakami, Nakaji Honda Fault Tolerance Comparison of IDS Models with Multilayer Perceptron and Radial Basis Function Networks. Search on Bibsonomy IJCNN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Abhishek Mitra, Walid A. Najjar, Laxmi N. Bhuyan Compiling PCRE to FPGA for accelerating SNORT IDS. Search on Bibsonomy ANCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF deep payload inspection, nondeterministic nite automata, intrusion detection system, regular expressions
47Emilio Corchado, Álvaro Herrero 0001, José Manuel Sáiz Testing CAB-IDS Through Mutations: On the Identification of Network Scans. Search on Bibsonomy KES (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Nigel Jacob, Carla E. Brodley Offloading IDS Computation to the GPU. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Lingjuan Li, Wenyu Tang, Ruchuan Wang 0001 A CBR Engine Adapting to IDS. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Ilija Basicevic, Miroslav Popovic, Vladimir Kovacevic The Use of Distributed Network-Based IDS Systems in Detection of Evasion Attacks. Search on Bibsonomy AICT/SAPIR/ELETE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Nathan Carey, George M. Mohay, Andrew J. Clark Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
47Ricki G. Ingalls, John W. Nazemetz Supply chain applications I: designing the support logistics for the FAA ACE-IDS system. Search on Bibsonomy WSC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
46Kulsoom Abdullah, Christopher P. Lee 0001, Gregory J. Conti, John A. Copeland, John T. Stasko IDS RainStorm: Visualizing IDS Alarms. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF IDS alarms, alert visualization, log visualization, alarm visualization, network security information visualization, network monitoring
42Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DEMEM, TBRPF, attack method, MPR selector, Hello message, TC message, ID message, ID Manager, ID-Evidence, ID-Forward, ID-Request, MANET, constraint, IDS, AODV, evidence, DSR, OLSR, forwarder, TESLA, MPR
42María Bermúdez-Edo, Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion event, Network security, Assessment, IDS
41Patrick S. Wheeler, Errin W. Fulp A taxonomy of parallel techniques for intrusion detection. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, intrusion detection systems (IDS)
41Hyun-A Park, Dong Hoon Lee 0001, Jongin Lim 0001, Sang Hyun Cho PPIDS: Privacy Preserving Intrusion Detection System. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Host-based IDS, Privacy, Intrusion Detection System, Audit log, Privacy Homomorphism
41John McHugh The 1998 Lincoln Laboratory IDS Evaluation. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Evaluation, IDS, ROC Analysis
40Sven Ehlert, Ge Zhang, Thomas Magedanz Increasing SIP firewall performance by ruleset size limitation. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Hui Liu, Zhitang Li Methodology of Network Intrusion Detection System Penetration Testing. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Babak Khosravifar, Jamal Bentahar An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Luciano Bononi, Carlo Tacconi Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure clustering and routing, Statistically unique and cryptographically verifiable identifiers, Mobile Ad Hoc and Vehicular Networks, Intrusion detection system
40Kuo Zhao, Meng Zhang 0006, Kexin Yang, Liang Hu 0001 Data Collection for Intrusion Detection System Based on Stratified Random Sampling. Search on Bibsonomy ICNSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Luciano Bononi, Carlo Tacconi A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure Clustering and Routing, Statistically Unique and Cryptographically Verifiable Identifiers, Mobile Ad Hoc Networks, Intrusion Detection System
40Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Frédéric Massicotte, François Gagnon, Yvan Labiche, Lionel C. Briand, Mathieu Couture Automatic Evaluation of Intrusion Detection Systems. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Ioannis Sourdis, Vassilis Dimopoulos, Dionisios N. Pnevmatikatos, Stamatis Vassiliadis Packet pre-filtering for network intrusion detection. Search on Bibsonomy ANCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF packet inspection, packet pre-filtering, intrusion detection
40Oge Marques, Pierre Baillargeon A Multimedia Traffic Classification Scheme for Intrusion Detection Systems. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Se-Yul Lee, Yong-Soo Kim, Bong-Hwan Lee, Sukhoon Kang, Chan-Hyun Youn A Probe Detection Model Using the Analysis of the Fuzzy Cognitive Maps. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Yong Zeng 0002, Jianfeng Ma 0001 Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Matthew V. Mahoney 0001, Philip K. Chan Learning nonstationary models of normal network traffic for detecting novel attacks. Search on Bibsonomy KDD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
40Ids Van der Werf, Henry Dol, Koen Blom, Richard Heusdens, Richard C. Hendriks, Geert Leus On the equivalence of OSDM and OTFS. Search on Bibsonomy Signal Process. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
40Ids Van der Werf, Richard Heusdens, Richard C. Hendriks, Geert Leus Optimal Pilot Design for OTFS in Linear Time-Varying Channels. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
40Ids Van der Werf, Richard C. Hendriks, Richard Heusdens, Geert Leus Transmit Waveform Design Based on the Cramér-Rao Lower Bound. Search on Bibsonomy CAMSAP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
40Ids Van der Werf, Richard C. Hendriks, Richard Heusdens Channel Parameter Estimation Using a Wideband LFM Preamble: Comparison of the Fractional Fourier Transform and Matched Filtering. Search on Bibsonomy EUSIPCO The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
40Ids Van der Werf, Pablo Martínez-Nuevo, Martin Bo Møller, Richard C. Hendriks, Jorge Martínez 0002 Towards Gridless Sound Field Reconstruction. Search on Bibsonomy EUSIPCO The full citation details ... 2022 DBLP  BibTeX  RDF
40Lennart Blanken, Ids van den Meijdenberg, Tom Oomen Kernel-based regression of non-causal systems for inverse model feedforward estimation. Search on Bibsonomy AMC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
40Emmy Rood, Robert-Jan Bosman, Johan Ids van der Spoel, Paul Taylor, Durk Freark Zandstra Research Paper: Use of a Computerized Guideline for Glucose Regulation in the Intensive Care Unit Improved Both Guideline Adherence and Glucose Regulation. Search on Bibsonomy J. Am. Medical Informatics Assoc. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Paul T. M. van Zeijl, Jan-Wim Th. Eikenbroek, Peter Paul Vervoort, Suma Setty, Jurjen Tangenberg, Gary Shipton, Eric Kooistra, Ids C. Keekstra, Didier Belot, Klaas Visser, Erwin Bosma, Stephan C. Blaakmeer A 1.1-V 270-μA mixed-signal hearing aid chip. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
40Paul T. M. van Zeijl, Jan-Wim Th. Eikenbroek, Peter Paul Vervoort, Suma Setty, Jurjen Tangenberg, Gary Shipton, Eric Kooistra, Ids C. Keekstra, Didier Belot, Klaas Visser, Erwin Bosma, Stephan C. Blaakmeer A Bluetooth radio in 0.18-μm CMOS. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
40Jouni Viinikka, Hervé Debar Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IDS background noise, alert volume reduction, EWMA
39Steven Noel, Sushil Jajodia Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Topological vulnerability analysis, Intrusion detection, Attack graphs, Sensor placement
39Masayuki Murakami, Nakaji Honda Performance of the IDS Method as a Soft Computing Tool. Search on Bibsonomy IEEE Trans. Fuzzy Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Ashok Kumar Tummala, Parimal Patel Distributed IDS using Reconfigurable Hardware. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Álvaro Herrero 0001, Emilio Corchado, José Manuel Sáiz MOVICAB-IDS: Visual Analysis of Network Traffic Data Streams for Intrusion Detection. Search on Bibsonomy IDEAL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Exploratory Projection Pursuit, Neural Networks, Intrusion Detection, Multiagent Systems, Unsupervised Learning, Computer Network Security
39Emmanuel Hooper An Intelligent Detection and Response Strategy to False Positives and Network Attacks: Operation of Network Quarantine Channels and Feedback Methods to IDS. Search on Bibsonomy SecPerU The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Emanoel Costa Claudino, Zair Abdelouahab, Mário Meireles Teixeira Management and Integration of Information in Intrusion Detection System: Data Integration System for IDS Based Multi-Agent Systems. Search on Bibsonomy IAT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Ricardo Staciarini Puttini, Jean-Marc Percher, Ludovic Mé, Rafael T. de Sousa Jr. A fully distributed IDS for MANET. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35A. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF personal IDS, smart card, Intrusion Detection System, IDS, behavioural analysis
34Rituparna Chaki, Nabendu Chaki IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. Search on Bibsonomy CISIM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Compromise node, Internal intrusion, Phantom intrusion detection, Mobile ad hoc network, IDS
34A. Karygiannis, E. Antonakakis, A. Apostolopoulos Detecting Critical Nodes for MANET Intrusion Detection Systems. Search on Bibsonomy SecPerU The full citation details ... 2006 DBLP  DOI  BibTeX  RDF edge-cut, vertex-cut, security, mobile ad hoc network, MANET, intrusion detection, IDS
34Jessie B. Kennedy, Peter J. Barclay (eds.) Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34Marc Gemis The Use of the Data Dictionary in DBMS Based on Graphs. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34Mohamed Dbouk, Donatas Kvedarauskas, Patrice Boursier Dynamic Maps: An Intuitive Interface for Naive Users of Geographical Database Systems. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34Thomas Schweikert, Matthias L. Hemmje A Graphical User Interface to the Object-Oriented Database System VODAK on the Basis of the Generic Visualisation Toolkit Lyberworld. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34Kenneth J. Mitchell, Jessie B. Kennedy DRIVE - An Environment for the Organised Construction of User-Interfaces to Databases. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34Ee-Peng Lim, Soo-Yin Cheng LibSearch: A Window-Based Frontend to Remote Bibliographic Databases on the Internet. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34Norman W. Paton, Khoa Doan, Oscar Díaz, Arturo Jaime 0001 Exploitation of Object-Oriented and Active Constructs in Database Interface Development. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34Laura Tarantino Hypertabular Representation of Database Relations in World Wide Web Front-Ends. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34Francesca Benzi, Dario Maio, Stefano Rizzi Visionary: A Visual Query Language Based on the User Viewpoint Approach. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34Shi-Kuo Chang, Maria Francesca Costabile, M. Vairo VR Queries and Their Transformations in a Progressive Querying Environment. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34Alison Crerar, Peter J. Barclay, Richard Watt TOTEM: An Interactive Tool for Creative Data Modelling. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34Armstrong Kadyamatimba, John A. Mariani, Peter Sawyer Desktop Objects: Directly Manipulating Data and Meta Data. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34J. Boyle, H. Horch, M. Scharf Visualising Large Data Sets in Molecular Biology. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34Matthew Chalmers Interface Design: More Craft than Science? Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34Marie-Aude Aufaure-Portier, Claude Trépied A Survey of Query Languages for Geographic Information Systems. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
34Albert N. Badre, Tiziana Catarci, Antonio Massari, Giuseppe Santucci Comparative Ease of Use of a Diagrammatic vs. an Iconic Query Language. Search on Bibsonomy IDS The full citation details ... 1996 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 2223 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license