|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 112 occurrences of 74 keywords
|
|
|
Results
Found 159 publication records. Showing 159 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
210 | Ting He 0001, Lang Tong |
Detecting Encrypted Stepping-Stone Connections. |
IEEE Trans. Signal Process. |
2007 |
DBLP DOI BibTeX RDF |
|
146 | Linfeng Zhang, Anthony G. Persaud, Alan Johnson, Yong Guan |
Detection of stepping stone attack under delay and chaff perturbations. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
125 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
Stepping-stone detection algorithm based on order preserving mapping. |
ICPADS |
2007 |
DBLP DOI BibTeX RDF |
|
125 | Yongzhong Zhang, Jianhua Yang, Chunming Ye |
Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
115 | Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang |
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
time perturbation, chaff, intrusion detection, Network security, stepping-stone, evasion |
106 | Pai Peng, Peng Ning, Douglas S. Reeves |
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
104 | Hyungwoo Kang, Soon Jwa Hong, Dong Hoon Lee 0001 |
Matching Connection Pairs. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
Connection pairs, Detoured attack, Traceback, Stepping stone, Backdoor |
102 | Han-Ching Wu, Shou-Hsuan Stephen Huang |
Detecting Stepping-Stone with Chaff Perturbations. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
Stepping-stone Detection, Chaff Perturbation, Intrusion Detection, Random Walk, Traceback |
96 | Avrim Blum, Dawn Xiaodong Song, Shobha Venkataraman |
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
Random walks, Network intrusion detection, Stepping stones, Evasion, Interactive sessions |
94 | Jianhua Yang, Yongzhong Zhang |
Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
TCP packet-matching, intrusion detection, Network security, round-trip time, stepping-stone |
93 | Mohd Nizam Omar, Mohd Aizaini Maarof, Anazida Zainal |
Solving Time Gap Problems through the Optimization of Detecting Stepping Stone Algorithm. |
CIT |
2004 |
DBLP DOI BibTeX RDF |
|
93 | David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford |
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
|
83 | W. Timothy Strayer, Christine E. Jones, Beverly Schwartz, Sarah Edwards, Walter C. Milliken, Alden W. Jackson |
Efficient Multi-Dimensional Flow Correlation. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
correlation algorithms, flow correlation, stepping stone detection |
83 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
Detecting Stepping-Stone Connection Using Association Rule Mining. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
82 | Han-Ching Wu, Shou-Hsuan Stephen Huang |
Performance of Neural Networks in Stepping-Stone Intrusion Detection. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
73 | Jianhua Yang, Byong Lee, Yongzhong Zhang |
Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
intrusion detection, Network security, round-trip time, stepping-stone |
72 | Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang |
Stepping-Stone Detection Via Request-Response Traffic Analysis. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
70 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Wei Ding 0003, Rebecca Kern, Jianhua Yang |
Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
Stepping-stone attack, pattern recognition, intrusion detection, network security |
70 | Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura 0001, Long Ni, Shou-Hsuan Stephen Huang |
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion. |
AINA |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection, network security, correlation coefficient, stepping-stone, interactive session |
64 | Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang 0005 |
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Xinyuan Wang 0005, Douglas S. Reeves, Shyhtsun Felix Wu |
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
62 | Jianhua Yang, Shou-Hsuan Stephen Huang, Ming Dong Wan |
A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
clustering, intrusion detection, Network security, partitioning, round-trip time, stepping-stone |
62 | Kwong H. Yung |
Detecting Long Connection Chains of Interactive Terminal Sessions. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
connection chain, terminal session, delayed acknowledgment, reply echo, echo delay, intrusion detection, network security, computer security, network protocol, Stepping stone |
53 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets. |
ICPADS |
2008 |
DBLP DOI BibTeX RDF |
|
53 | W. Timothy Strayer, Christine E. Jones, Beverly Schwartz |
Architecture for Multi-Stage Network Attack Traceback. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Wei Ding 0003, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, Zach Riggle |
Detecting Stepping-Stone Intruders with Long Connection Chains. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
51 | Jianhua Yang, Byong Lee |
Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Yongping Tang, Yema Liverpool, Thomas E. Daniels |
Monitor placement for stepping stone analysis. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
43 | V. Srinivasan, Gerald L. Thompson |
Benefit-Cost Analysis of Coding Techniques for the Primal Transportation Algorithm. |
J. ACM |
1973 |
DBLP DOI BibTeX RDF |
|
41 | Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S. H. Huang |
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
time-jittering, chaff-perturbation, intrusion detection, Network security, manipulation, stepping-stone, evasion |
32 | Jianhua Yang, Shou-Hsuan Stephen Huang |
Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Zhengzhe Liu, Peng Dai, Ruihui Li, Xiaojuan Qi 0001, Chi-Wing Fu |
ISS++: Image as Stepping Stone for Text-Guided 3D Shape Generation. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Kevin A. Fischer |
Reflective Linguistic Programming (RLP): A Stepping Stone in Socially-Aware AGI (SocialAGI). |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Zhengzhe Liu, Peng Dai, Ruihui Li, Xiaojuan Qi 0001, Chi-Wing Fu |
DreamStone: Image as a Stepping Stone for Text-Guided 3D Shape Generation. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Leonard Stellbrink, Lilian Kojan, André Calero Valdez |
Making Assumptions Transparent: Iterative Exploratory Modeling as a Stepping Stone for Agent-Based Model Development. |
HCI (16) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Detravious Jamari Brinkley, Emmanuel Johnson, Tiantian Feng, Yolanda Gil |
Reproducibility as a Stepping Stone to Intelligent Assistants for Data Analysis: Recreating a Study of Physical Activity, Sleep, and Work Shift in Nurses. |
IUI Companion |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Marko Orosnjak, Mitar Jocanovic, Marko Pencic, Dragana Oros |
From Signals to Insights: Uncovering Latent Degradation with Deep Learning as a Stepping Stone Towards Digital Twins of Failures (DTFs). |
ICSRS |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Zhengzhe Liu, Peng Dai, Ruihui Li, Xiaojuan Qi 0001, Chi-Wing Fu |
ISS: Image as Stepping Stone for Text-Guided 3D Shape Generation. |
ICLR |
2023 |
DBLP BibTeX RDF |
|
29 | Jianhua Yang, Lixin Wang, Suhev Shakya |
Modelling Network Traffic and Exploiting Encrypted Packets to Detect Stepping-stone Intrusions. |
J. Internet Serv. Inf. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Yi-Ping You, Yi-Chiao Su |
Reduced O3 subsequence labelling: a stepping stone towards optimisation sequence prediction. |
Connect. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Zhengzhe Liu, Peng Dai, Ruihui Li, Xiaojuan Qi 0001, Chi-Wing Fu |
ISS: Image as Stepping Stone for Text-Guided 3D Shape Generation. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Vésteinn Snæbjarnarson, Hafsteinn Einarsson |
Cross-Lingual QA as a Stepping Stone for Monolingual Open QA in Icelandic. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Lixin Wang, Jianhua Yang, Austin Lee |
An Effective Approach for Stepping-Stone Intrusion Detection Using Packet Crossover. |
WISA |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Noah Neundorfer, Jianhua Yang, Lixin Wang |
Modeling Network Traffic via Identifying Encrypted Packets to Detect Stepping-Stone Intrusion Under the Framework of Heterogonous Packet Encryption. |
AINA (2) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Jonathan Rodriguez 0001, Georgios P. Koudouridis, Xavier Gelabert, Muhammad Tayyab, Riccardo Bassoli, Frank H. P. Fitzek, Roberto Torre Arranz, Raed Abd-Alhameed, Maryam Sajedin, Issa T. E. Elfergani, Sarah Irum, Gerrit Schulte, Pedro Diogo, Fatma Marzouk, Marcus de Ree, Georgios Mantas, Ilias Politis |
Secure Virtual Mobile Small Cells: A Stepping Stone Toward 6G. |
IEEE Commun. Stand. Mag. |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Lixin Wang, Jianhua Yang, Michael Workman, Peng-Jun Wan |
A Framework to Test Resistency of Detection Algorithms for Stepping-Stone Intrusion on Time-Jittering Manipulation. |
Wirel. Commun. Mob. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Lixin Wang, Jianhua Yang, XiaoHua Xu, Peng-Jun Wan |
Mining Network Traffic with the k -Means Clustering Algorithm for Stepping-Stone Intrusion Detection. |
Wirel. Commun. Mob. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Jonathan Rodriguez 0001, George P. Koudouridis, Xavier Gelabert, Muhammad Tayyab, Riccardo Bassoli, Frank H. P. Fitzek, Roberto Torre Arranz, Raed Abd-Alhameed, Maryam Sajedin, Issa T. E. Elfergani, Sarah Irum, Gerrit Schulte, Pedro Diogo, Fatma Marzouk, Marcus de Ree, Georgios Mantas, Ilias Politis |
Secure Virtual Mobile Small Cells: A Stepping Stone Towards 6G. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
29 | Louis Allen, Jack Atkinson, Dinusha Jayasundara, Joan L. Cordiner, Peyman Z. Moghadam |
Data visualization for Industry 4.0: A stepping-stone toward a digital future, bridging the gap between academia and industry. |
Patterns |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Lixin Wang |
Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection. |
Sensors |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Danesh Ashouri Vajari, Maria Vomero, Volker A. Coenen, Thomas Stieglitz |
A stepping stone to enable preclinical evaluation of multimodal thin-film probes in small animal models. |
NER |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Lixin Wang, Suhev Shakya, Michael Workman |
Identify Encrypted Packets to Detect Stepping-Stone Intrusion. |
AINA (2) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Zhaoming Xie, Hung Yu Ling, Nam Hee Kim, Michiel van de Panne |
ALLSTEPS: Curriculum-driven Learning of Stepping Stone Skills. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
29 | Zhaoming Xie, Hung Yu Ling, Nam Hee Kim, Michiel van de Panne |
ALLSTEPS: Curriculum-driven Learning of Stepping Stone Skills. |
Comput. Graph. Forum |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Lixin Wang, Jianhua Yang, Mary McCormick, Peng-Jun Wan, XiaoHua Xu |
Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means Clustering. |
IPCCC |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Henry Clausen, Michael Scott Gibson, David Aspinall 0001 |
Evading Stepping-Stone Detection with Enough Chaff. |
NSS |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Sameera Kannangara, Egemen Tanin, Aaron Harwood, Shanika Karunasekera |
Stepping Stone Graph: A Graph for Finding Movement Corridors using Sparse Trajectories. |
ACM Trans. Spatial Algorithms Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Yanyan Jiang 0003 |
Competition and the stepping-stone theory in the broadband access market. |
Clust. Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Marco A. Gamarra, Sachin Shetty, David M. Nicol, Laurent Njilla, Oscar R. González |
Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure. |
GLOBECOM |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Ana Beatriz Cruz, Armando Sousa, Ângela Cardoso, Bernardo Valente, Ana Reis 0001 |
Smart Data Visualisation as a Stepping Stone for Industry 4.0 - a Case Study in Investment Casting Industry. |
ROBOT (1) |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Lixin Wang, Andrew Lesh, Brian Lockerbie |
Manipulating network traffic to evade stepping-stone intrusion detection. |
Internet Things |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Phillip S. Hudson, Kyungreem Han, H. Lee Woodcock III, Bernard R. Brooks |
Force matching as a stepping stone to QM/MM CB[8] host/guest binding free energies: a SAMPL6 cautionary tale. |
J. Comput. Aided Mol. Des. |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Lixin Wang, Jianhua Yang |
A research survey in stepping-stone intrusion detection. |
EURASIP J. Wirel. Commun. Netw. |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Floris Devriendt, Darie Moldovan, Wouter Verbeke |
A Literature Survey and Experimental Evaluation of the State-of-the-Art in Uplift Modeling: A Stepping Stone Toward the Development of Prescriptive Analytics. |
Big Data |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Alex Lu 0001, Jason Brill, Tawanna R. Dillahunt |
DreamGigs: A "Stepping Stone" for Low-resource Job Seekers to Reach Their Ideal Job. |
CSCW Companion |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Marco A. Gamarra, Sachin Shetty, David M. Nicol, Oscar Gonazlez, Charles A. Kamhoua, Laurent Njilla |
Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs. |
ICC |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Sameera Kannangara, Egemen Tanin, Aaron Harwood, Shanika Karunasekera |
Stepping stone graph for public movement analysis. |
SIGSPATIAL/GIS |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Yongzhong Zhang, Robert King, Tim Tolbert |
Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection. |
AINA Workshops |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Dirk Stroobandt, Catalin Bogdan Ciobanu, Marco D. Santambrogio, Gabriel Figueiredo, Andreas Brokalakis, Dionisios N. Pnevmatikatos, Michael Hübner 0001, Tobias Becker, Alex J. W. Thom |
An open reconfigurable research platform as stepping stone to exascale high-performance computing. |
DATE |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Yongzhong Zhang, Guoqing Zhao |
Integrate Stepping-Stone Intrusion Detection Technique into Cybersecurity Curriculum. |
AINA Workshops |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Haoyu Song 0001, Jun Gong, Hongfei Chen, Tom Tofigh |
Dynamic Network Probes: A Stepping Stone to Omni Network Visibility. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
29 | Xiaoqiang Xu, Jing Zhang 0015, Qianmu Li |
Equalized Interval Centroid Based Watermarking Scheme for Stepping Stone Traceback. |
DSC |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Pablo Corbalan, Ramona Marfievici, Victor Cionca, Donna O'Shea, Dirk Pesch |
Into the SMOG: The Stepping Stone to Centralized WSN Control. |
MASS |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Shou-Hsuan Stephen Huang, Hongyang Zhang, Michael Phay |
Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections. |
AINA |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Yongzhong Zhang |
RTT-Based Random Walk Approach to Detect Stepping-Stone Intrusion. |
AINA |
2015 |
DBLP DOI BibTeX RDF |
|
29 | David M. Nicol, Vikas Mallapura |
Modeling and analysis of stepping stone attacks. |
WSC |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Claudia Loebbecke, Helmut Krcmar |
Information Systems And Employment: From Idealization To Understanding As Stepping Stone To Action. |
UKAIS |
2014 |
DBLP BibTeX RDF |
|
29 | Han-Wei Hsiao, Huey-Min Sun, Wei-Cheng Fan |
Detecting stepping-stone intrusion using association rule mining. |
Secur. Commun. Networks |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Kjell O. Jeppson |
A learning tool MOSFET model: A stepping-stone from the square-law model to BSIM4. |
PATMOS |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Jerome K. Vanclay |
Impact Factor: outdated artefact or stepping-stone to journal certification? |
CoRR |
2012 |
DBLP BibTeX RDF |
|
29 | Jerome K. Vanclay |
Impact factor: outdated artefact or stepping-stone to journal certification? |
Scientometrics |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Kenichi Kourai, Takeshi Azumi, Shigeru Chiba |
A Self-Protection Mechanism against Stepping-Stone Attacks for IaaS Clouds. |
UIC/ATC |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Yingjie Sheng, Yongzhong Zhang, Jianhua Yang |
Mining Network Traffic Efficiently to Detect Stepping-Stone Intrusion. |
AINA |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Giovanni Di Crescenzo, Abhrajit Ghosh, Abhinay Kampasi, Rajesh Talpade, Yin Zhang |
Detecting Anomalies in Active Insider Stepping Stone Attacks. |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Han-Ching Wu, Shou-Hsuan Stephen Huang |
Packet-based algorithms for stepping-stone detection with chaff perturbation. |
Secur. Commun. Networks |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, David Woolbright |
Correlating TCP/IP Packet contexts to detect stepping-stone intrusion. |
Comput. Secur. |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Miranda D. Stobbe, Sander M. Houten, Gerbert A. Jansen, Antoine H. C. van Kampen, Perry D. Moerland |
Critical assessment of human metabolic pathway databases: a stepping stone for future integration. |
BMC Syst. Biol. |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Shou-Hsuan Stephen Huang, Ying-Wei Kuo |
Detecting Chaff Perturbation on Stepping-Stone Connection. |
ICPADS |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Lydia Ray, Guoqing Zhao |
Detect Stepping-Stone Insider Attacks by Network Traffic Mining and Dynamic Programming. |
AINA |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Han-Ching Wu, Shou-Hsuan Stephen Huang |
Neural networks-based detection of stepping-stone intrusion. |
Expert Syst. Appl. |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Jaideep D. Padhye, Kush Kothari, Madhu Venkateshaiah, Matthew K. Wright |
Evading stepping-stone detection under the cloak of streaming media with SNEAK. |
Comput. Networks |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Christopher Hill |
Detect multi-hop stepping-stone pairs with clock skew. |
IAS |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Ping Li 0019, Wanlei Zhou 0001, Yanli Yu |
A Quick-Response Real-Time Stepping Stone Detection Scheme. |
HPCC |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Ping Li 0019, Wanlei Zhou 0001, Yini Wang |
Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Baris Coskun, Nasir D. Memon |
Online Sketching of Network Flows for Real-Time Stepping-Stone Detection. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Jianhua Yang, Byong Lee, Stephen S. H. Huang |
Monitoring Network Traffic to Detect Stepping-Stone Intrusion. |
AINA Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Sukanya Manna, Tom Gedeon |
A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
Gain of Words, Gain of Sentences, term significance, Information retrieval, summarization, investigation |
29 | Jianhua Yang, Shou-Hsuan Stephen Huang |
Mining TCP/IP packets to detect stepping-stone intrusion. |
Comput. Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Yunhyong Kim, Seamus Ross |
Searching for Ground Truth: A Stepping Stone in Automating Genre Classification. |
DELOS |
2007 |
DBLP DOI BibTeX RDF |
automated metadata extraction, digital library, metadata, information extraction, data management, genre classification |
29 | Ting He 0001, Lang Tong |
Detecting Encrypted Interactive Stepping-Stone Connections. |
ICASSP (3) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 159 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|