|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3828 occurrences of 1280 keywords
|
|
|
Results
Found 13052 publication records. Showing 13052 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
83 | Young U. Ryu, Hyeun-Suk Rhee |
Evaluation of Intrusion Detection Systems Under a Resource Constraint. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
optimal inspection rates, optimal operating points, intrusion detection, Computer security |
76 | Zhuowei Li 0001, Amitabha Das, Jianying Zhou 0001 |
Model Generalization and Its Implications on Intrusion Detection. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
Security, Machine Learning, Intrusion Detection, Generalization, Intrusion, Security Infrastructure |
72 | Yoshinori Okazaki, Izuru Sato, Shigeki Goto |
A New Intrusion Detection Method based on Process Profiling. |
SAINT |
2002 |
DBLP DOI BibTeX RDF |
MID, DP matching m, Intrusion Detection, Profile, IDS, AID |
69 | Luigi Coppolino, Salvatore D'Antonio, Ivano Alessandro Elia, Luigi Romano |
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach. |
SEUS |
2009 |
DBLP DOI BibTeX RDF |
Intrusion Detection and Diagnosis, Information Diversity, Stealthy and non-vulnerability attacks, Ontologies |
68 | Moon Sun Shin, Kyeong Ja Jeong |
An Alert Data Mining Framework for Network-Based Intrusion Detection System. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Hervé Debar, Andreas Wespi |
Aggregation and Correlation of Intrusion-Detection Alerts. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
alert aggregation, alert data model, Intrusion detection, alert correlation |
65 | Guiling Zhang, Jizhou Sun |
A Novel Network Intrusion Attempts Prediction Model Based on Fuzzy Neural Network. |
International Conference on Computational Science (1) |
2006 |
DBLP DOI BibTeX RDF |
Intrusion Attempt Prediction, Intrusion Detection, Fuzzy Neural Network |
61 | Steven R. Johnston |
The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
trans-border data flow, intrusion detection. (c) Her Majesty the Queen as represented by the Minister of National Defence, acting on behalf of the Communications Security Establishment, 2001, Privacy, data protection, personal information, personal data, Canada |
61 | Giovanni Vigna, Richard A. Kemmerer, Per Blix |
Designing a Web of Highly-Configurable Intrusion Detection Sensors. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
STAT, Security, Software Engineering, Intrusion Detection |
60 | Jie Zeng, Tao Li 0016, Guiyang Li, Haibo Li 0003 |
A New Intrusion Detection Method Based on Antibody Concentration. |
ICIC (2) |
2009 |
DBLP DOI BibTeX RDF |
Antibody concentration, Antigen intrusion intensity, Antigen-antibody reactions, Intrusion detection, False alarm rate, Detection rate |
58 | Robert Gavin Goss, Martin Botha, Rossouw von Solms |
Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. |
SAICSIT |
2007 |
DBLP DOI BibTeX RDF |
NeGPAIM-W, wireless intrusion detection, intrusion detection, wireless LAN, information technology, information security, computer security, intrusion detection system |
58 | Simon P. Chung, Aloysius K. Mok |
On Random-Inspection-Based Intrusion Detection. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
random inspection, intrusion detection, computer security, Mimicry attacks |
57 | Shaohua Teng, Wei Zhang 0005, Xiufen Fu, Wenwei Tan |
Cooperative intrusion detection model based on scenario. |
CSCWD |
2007 |
DBLP DOI BibTeX RDF |
|
57 | Jianhua Sun 0002, Hai Jin 0001, Hao Chen 0002, Qian Zhang, Zongfen Han |
A Compound Intrusion Detection Model. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
56 | Liwei Kuang, Mohammad Zulkernine |
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection systems, Intrusion-tolerance |
56 | Michael E. Locasto, Ke Wang 0009, Angelos D. Keromytis, Salvatore J. Stolfo |
FLIPS: Hybrid Adaptive Intrusion Prevention. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
Adaptive Response, Intrusion Tolerance, Intrusion Prevention |
56 | Joachim Biskup, Ulrich Flegel |
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
audit analysis, purpose binding, privacy, intrusion detection, anonymity, secret sharing, pseudonymity |
56 | Andreas Wespi, Marc Dacier, Hervé Debar |
Intrusion Detection Using Variable-Length Audit Trail Patterns. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
Teiresias, variable-length patterns, C2 audit trail, functionality verification tests, Intrusion detection, pattern matching, pattern discovery |
56 | Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric |
Measuring intrusion detection capability: an information-theoretic approach. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
information-theoretic, intrusion detection, performance measurement |
56 | Dong Seong Kim 0001, Sang Min Lee 0018, Jong Sou Park |
Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
Data mining, Intrusion Detection System, Random Forest |
56 | Darren Mutz, Giovanni Vigna, Richard A. Kemmerer |
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
Software Testing, Intrusion Detection, Traffic Generation, Evasion Attacks |
56 | Peng Ning, Yun Cui, Douglas S. Reeves |
Constructing attack scenarios through correlation of intrusion alerts. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
intrusion detection, alert correlation, attack scenarios |
54 | Hong Han 0003, Xianliang Lu, Jun Lu, Bo Chen, Ren Li Yong |
Data mining aided signature discovery in network-based intrusion detection system. |
ACM SIGOPS Oper. Syst. Rev. |
2002 |
DBLP DOI BibTeX RDF |
network-based intrusion detection, signature discovery, data mining, intrusion detection system |
54 | Kofi Nyarko, Tanya Capers, Craig Scott, Kemi Ladeji-Osias |
Network Intrusion Visualization with NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration. |
Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems |
2002 |
DBLP DOI BibTeX RDF |
|
54 | Magnus Almgren, Ulf Lindqvist |
Application-Integrated Data Collection for Security Monitoring. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
Intrusion detection, application, Web server, module, application-integrated, Apache |
52 | Yaping Jiang, Yong Gan, Jianhua Zhou, Zengyu Cai |
A Model of Intrusion Prevention Base on Immune. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Di Yao, Dan Feng 0001 |
Intrusion Detection for Object-Based Storage System. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Byung kwan Lee, Seung Hae Yang, Dong-Hyuck Kwon, Dai-Youn Kim |
PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Byung-Joo Kim, Il Kon Kim |
Two-Tier Based Intrusion Detection System. |
FSKD (2) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade |
Towards a Theory of Intrusion Detection. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Zhuowei Li 0001, Amitabha Das |
Visualizing and Identifying Intrusion Context from System Calls Trace. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Marc Dacier, O. Sami Saydjari |
Special Seminar: Intrusion Detection. |
FTCS |
1999 |
DBLP DOI BibTeX RDF |
|
50 | Junfeng Tian, Tao Liu, Hongqiang Jiao |
Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
evaluation, network security, intrusion detection system, fuzzy comprehensive evaluation |
50 | A. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff |
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
personal IDS, smart card, Intrusion Detection System, IDS, behavioural analysis |
50 | Shaohua Teng, Wei Zhang 0005, Xiufen Fu, Naiqi Wu |
Cooperative Intrusion Detection Model Based on State Transition Analysis. |
CSCWD (Selected Papers) |
2007 |
DBLP DOI BibTeX RDF |
Cooperative intrusion detection, Isomorphic transformation, Crucial operation, Scenario, State transition, Topological order |
50 | Gil-Han Kim, Hyung-Woo Lee |
SVM Based False Alarm Minimization Scheme on Intrusion Prevention System. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
Intrusion Detection/Prevention, Network Security.1, False Alarm, Multi-class SVM |
50 | Noria Foukia |
IDReAM: intrusion detection and response executed with agent mobility architecture and implementation. |
AAMAS |
2005 |
DBLP DOI BibTeX RDF |
intrusion detection and response, mobile agents |
50 | Xinyuan Wang |
The loop fallacy and serialization in tracing intrusion connections through stepping stones. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
intrusion tracing, correlation, serialization, stepping stones |
50 | Geetha Ramachandran, Delbert Hart |
A P2P intrusion detection system based on mobile agents. |
ACM Southeast Regional Conference |
2004 |
DBLP DOI BibTeX RDF |
mobile agents, intrusion detection |
50 | Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 |
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
Intrusion detection, Network security, Data visualization, Multivariate data analysis |
50 | Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer |
Designing and implementing a family of intrusion detection systems. |
ESEC / SIGSOFT FSE |
2003 |
DBLP DOI BibTeX RDF |
security, intrusion detection, object-oriented frameworks, program families |
50 | Stefan Axelsson |
The base-rate fallacy and the difficulty of intrusion detection. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
base-rate fallacy, intrusion detection, false alarm rate, detection rate |
49 | Balaji Rajendran, Dnyanesh Pawar |
An intelligent contextual support system for intrusion detection tasks. |
CHIMIT |
2009 |
DBLP DOI BibTeX RDF |
contextual support system, intelligent contextual support systems, network security engineer, network security system, intrusion detection, intrusion detection system |
49 | Bazara I. A. Barry |
Intrusion detection with OMNeT++. |
SimuTools |
2009 |
DBLP DOI BibTeX RDF |
intrusion simulation, performance evaluation, intrusion detection, OMNeT++ |
49 | Hai Jin 0001, Guofu Xiang, Feng Zhao 0003, Deqing Zou, Min Li, Lei Shi |
VMFence: a customized intrusion prevention system in distributed virtual computing environment. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
virtual computing platform, distributed system, intrusion detection, network security, virtualization, intrusion prevention |
49 | José M. González, Vern Paxson, Nicholas Weaver |
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
nips, fpga, intrusion detection, hardware acceleration, intrusion prevention, nids |
49 | P. Ramasubramanian, Arputharaj Kannan |
A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system. |
Soft Comput. |
2006 |
DBLP DOI BibTeX RDF |
Database anomaly intrusion prediction, Genetic algorithms, Artificial neural networks, Database security, Intrusion prevention |
49 | Wanqing Wu, Madalene Spezialetti, Rajiv Gupta 0001 |
A Protocol for Removing Communication Intrusion in Monitored Distributed Systems. |
ICDCS |
1998 |
DBLP DOI BibTeX RDF |
intrusion removal, distributed systems, monitoring, tools, communication protocols, intrusion |
48 | Myung-Kyu Yi, Chong-Sun Hwang |
A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion Detection System. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
48 | John McHugh |
Intrusion and intrusion detection. |
Int. J. Inf. Sec. |
2001 |
DBLP DOI BibTeX RDF |
|
48 | Robert K. Cunningham, Craig S. Stevenson |
Accurately Detecting Source Code of Attacks That Increase Privilege. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
Machine Learning, Intrusion Detection, Malicious Code |
47 | Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt |
A Specification-Based Intrusion Detection Model for OLSR. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
Specification based IDS, MANET, Mobile ad hoc network, Intrusion Detection, Network Security, Constraints, OLSR |
47 | Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt |
Formal Reasoning About Intrusion Detection Systems. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
verification, formal method, Intrusion detection, security policy |
47 | Richard Lippmann, Seth E. Webster, Douglas Stetson |
The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
Internet, network, Intrusion detection, DoS, attack, signature, worm, scan, vulnerability, probe, patch, exploit, false alarm |
47 | Peng Ning, Yun Cui, Douglas S. Reeves |
Analyzing Intensive Intrusion Alerts via Correlation. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
Attack Scenario Analysis, Intrusion Detection, Alert Correlation |
46 | Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Karl N. Levitt |
System Health and Intrusion Monitoring Using a Hierarchy of Constraints. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Prem Uppuluri, R. Sekar 0001 |
Experiences with Specification-Based Intrusion Detection. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Marc G. Welz, Andrew Hutchison |
Interfacing Trusted Applications with Intrusion Detection Systems. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Dominique Alessandri |
Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
|
46 | Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das |
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
|
46 | Jianjing Sun, Han Yang 0005, Jingwen Tian, Fan Wu |
Intrusion Detection Method Based on Wavelet Neural Network. |
WKDD |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Byung-Joo Kim, Il Kon Kim |
Improved Kernel Based Intrusion Detection System. |
ICANN (2) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Byung-Joo Kim, Il Kon Kim |
Kernel Based Intrusion Detection System. |
ACIS-ICIS |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Jaydip Sen, Indranil Sengupta 0001 |
Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System. |
ICDCIT |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Richard A. Kemmerer |
Designing and implementing a family of intrusion detection systems. |
ASE |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Michael Attig, John W. Lockwood |
SIFT: Snort Intrusion Filter for TCP. |
Hot Interconnects |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Byung-Joo Kim, Il Kon Kim |
Machine Learning Approach to Realtime Intrusion Detection System. |
Australian Conference on Artificial Intelligence |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Lawrence Teo, Yuliang Zheng 0001, Gail-Joon Ahn |
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
Intrusion Detection Force, Internet Scale, Fault Tolerance, Intrusion Detection, Information Sharing, Recovery, Survivability, Infrastructure |
45 | Jingmin Zhou, Mark R. Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop |
Modeling network intrusion detection alerts for correlation. |
ACM Trans. Inf. Syst. Secur. |
2007 |
DBLP DOI BibTeX RDF |
alert fusion, intrusion detection, capability, Alert correlation |
45 | Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark Green 0001, Miguel Ángel García-Ruíz |
Toward Sound-Assisted Intrusion Detection Systems. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
Intrusion detection, computer networks, multimodal interfaces, human-computer interfaces, computer forensics |
45 | Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque |
E-NIPS: An Event-Based Network Intrusion Prediction System. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Intrusion detection and prediction, attack classes, network security |
45 | Yang Li 0002, Binxing Fang, Li Guo 0001, You Chen |
TCM-KNN Algorithm for Supervised Network Intrusion Detection. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
supervised intrusion detection, TCM-KNN algorithm, data mining, machine learning, network security, TCM |
45 | You Chen, Yang Li 0002, Xueqi Cheng, Li Guo 0001 |
Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
feature selection, intrusion detection, filter, hybrid, wrapper |
45 | María Bermúdez-Edo, Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro |
Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems. |
CRITIS |
2006 |
DBLP DOI BibTeX RDF |
Intrusion event, Network security, Assessment, IDS |
45 | Jingtao Yao 0001, Songlun Zhao, Lisa Fan |
An Enhanced Support Vector Machine Model for Intrusion Detection. |
RSKT |
2006 |
DBLP DOI BibTeX RDF |
support vector machine, feature selection, Intrusion detection, rough sets |
45 | Yoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won |
Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
Damage Propagation, Information Security control system (ISMS), Forecast, Intrusion, Weather Forecasting |
45 | Sanjay Rawat 0001, Ved Prakash Gulati, Arun K. Pujari |
A Fast Host-Based Intrusion Detection System Using Rough Set Theory. |
Trans. Rough Sets |
2005 |
DBLP DOI BibTeX RDF |
Data mining, Intrusion Detection, Rough Set, Decision Table, Anomaly, Misuse |
45 | Pradeep Kannadiga, Mohammad Zulkernine |
DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. |
SNPD |
2005 |
DBLP DOI BibTeX RDF |
network security and distributed systems, mobile agents, Intrusion detection, distributed attacks |
45 | Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu |
Techniques and tools for analyzing intrusion alerts. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
Intrusion detection, security management, alert correlation |
45 | Jian Guan, Daxin Liu 0001, Tong Wang 0005 |
Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems. |
ICCSA (3) |
2004 |
DBLP DOI BibTeX RDF |
Data Mining, Intrusion Detection, Network Security, Fuzzy Sets |
45 | Xian Rao, Cun-xi Dong, Shao-quan Yang |
Statistic Learning and Intrusion Detection. |
RSFDGrC |
2003 |
DBLP DOI BibTeX RDF |
statistic learning intrusion detection network security support vector machines neural network |
45 | Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi |
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
Bayesian network based detection, Missed alarms, Intrusion detection, Event correlation, False alarms |
45 | Glenn A. Fink, Karen F. O'Donoghue, Brett L. Chappell, T. G. Turner |
A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems. |
IPDPS |
2002 |
DBLP DOI BibTeX RDF |
Security, Evaluation, Real-Time, Intrusion Detection, Metrics, Distributed |
44 | Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo |
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
|
43 | Chengpo Mu, X. J. Li, Houkuan Huang, Shengfeng Tian |
Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
Online Risk Assessment, Alert Processing, Intrusion Response, Intrusion detection, D-S Evidence Theory |
43 | Rituparna Chaki, Nabendu Chaki |
IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. |
CISIM |
2007 |
DBLP DOI BibTeX RDF |
Compromise node, Internal intrusion, Phantom intrusion detection, Mobile ad hoc network, IDS |
43 | Peng Ning, Dingbang Xu |
Hypothesizing and reasoning about attacks missed by intrusion detection systems. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
Intrusion alert correlation, missed attacks, intrusion detection |
43 | Tom Dunigan, Greg Hinkel |
Intrusion Detection and Intrusion Prevention on a Large Network: A Case Study. |
Workshop on Intrusion Detection and Network Monitoring |
1999 |
DBLP BibTeX RDF |
|
43 | Ambareen Siraj, Rayford B. Vaughn, Susan Bridges |
Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Kim Potter Kihlstrom, Priya Narasimhan |
The Starfish System: Providing Intrusion Detection and Intrusion Tolerance for Middleware Systems. |
WORDS |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Hervé Debar, Benjamin Morin |
Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
|
43 | Alfonso Valdes, Keith Skinner |
Adaptive, Model-Based Monitoring for Cyber Attack Detection. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
Innovative approaches, IDS cooperation, Bayes nets, Intrusion detection |
41 | Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis |
Gnort: High Performance Network Intrusion Detection Using Graphics Processors. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
parallel programming, network security, GPU, pattern matching, intrusion detection systems, SIMD |
41 | Eric Totel, Frédéric Majorczyk, Ludovic Mé |
COTS Diversity Based Intrusion Detection and Application to Web Servers. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
COTS diversity, Intrusion detection, anomaly detection, design diversity |
41 | Steven R. Johnston |
Development of a Legal Framework for Intrusion Detection. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception |
41 | Ulf Lindqvist, Erland Jonsson |
How to Systematically Classify Computer Security Intrusions. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
Security, Classification, Intrusion Detection, Experiment, Computers, Taxonomy, Intrusion |
41 | Zakia Marrakchi, Ludovic Mé, Bernard Vivinis, Benjamin Morin |
Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
|
41 | Anup K. Ghosh, Christoph C. Michael, Michael Schatz |
A Real-Time Intrusion Detection System Based on Learning Program Behavior. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
|
41 | Chris Strasburg, Natalia Stakhanova, Samik Basu 0001, Johnny S. Wong |
A Framework for Cost Sensitive Assessment of Intrusion Response Selection. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | I. V. M. de Lima, Joelson A. Degaspari, João Bosco M. Sobral |
Intrusion detection through artificial neural networks. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 13052 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|