Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Eray Balkanli, Jander Alves, Nur Zincir-Heywood |
Supervised learning to detect DDoS attacks. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Shahbar, Nur Zincir-Heywood |
Benchmarking two techniques for Tor classification: Flow level and circuit level classification. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Obermeier 0001, Michael Wahler, Thanikesavan Sivanthi, Roman Schlegel, Aurelien Monot |
Automatic attack surface reduction in next-generation industrial control systems. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Foaad Khosmood, Phillip L. Nico, Jonathan Woolery |
User identification through command history analysis. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohiuddin Solaimani, Mohammed Iftekhar, Latifur Khan, Bhavani Thuraisingham, Joey Burton Ingram |
Spark-based anomaly detection over multi-source VMware performance data in real-time. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ugur Pehlivan, Nuray Baltaci, Cengiz Acartürk, Nazife Baykal |
The analysis of feature selection methods and classification algorithms in permission based Android malware detection. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | El-Sayed M. El-Alfy, Ali A. Al-Hasan |
A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Carlos A. S. Assis, Adriano César Machado Pereira, Marconi de Arruda Pereira, Eduardo G. Carrano |
A genetic programming approach for fraud detection in electronic transactions. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014 |
CICS |
2014 |
DBLP BibTeX RDF |
|
1 | Arisoa S. Randrianasolo, Larry D. Pyeatt |
A theoretical Q-learning temporary security repair. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili 0001 |
Quantifying the impact of unavailability in cyber-physical environments. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Karel P. Bergmann, Jörg Denzinger |
Automated testing for cyber threats to ad-hoc wireless networks. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dipankar Dasgupta, Denise Ferebee, Sanjib Kumar Saha, Abhijit Kumar Nag, Kul Prasad Subedi, Alvaro Madero, Abel Sanchez, John R. Williams |
G-NAS: A grid-based approach for negative authentication. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | El-Sayed M. El-Alfy, Asem A. Ghaleb |
Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study. |
CICS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hossein Rahimi, Nur Zincir-Heywood, Bharat Gadher |
Indoor geo-fencing and access control for wireless networks. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kesav Kancherla, Srinivas Mukkamala |
Image visualization based malware detection. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sanjay Rawat 0001, Fabien Duchene, Roland Groz, Jean-Luc Richier |
Evolving indigestible codes: Fuzzing interpreters with genetic programming. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore |
CICS |
2013 |
DBLP BibTeX RDF |
|
1 | Hector M. Lugo-Cordero, Ratan K. Guha |
What defines an intruder? An intelligent approach. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mahendra Piraveenan, Shahadat Uddin, Kon Shing Kenneth Chung, Dharshana Kasthurirathna |
Quantifying encircling behaviour in complex networks. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marcos Álvares Barbosa Junior, Tshilidzi Marwala, Fernando Buarque de Lima Neto |
Applications of computational intelligence for static software checking against memory corruption vulnerabilities. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Simon Miller, Jonathan M. Garibaldi, Susan Appleby |
Evolving OWA operators for cyber security decision making problems. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | S. Ganesh Babu, Ilango Paramasivam |
Higher dimensional chaos for Audio encryption. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta |
Resilient hybrid overlay model for smart grid: RHM for smart grid. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chirag Modi 0001, Dhiren R. Patel |
A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing. |
CICS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Robert K. Abercrombie, Erik M. Ferragut, Frederick T. Sheldon, Michael R. Grimaila |
Addressing the need for independence in the CSE model. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Scott Musman, Mike Tanner, Aaron Temin, Evan Elsaesser, Lewis Loren |
A systems engineering approach for crown jewels estimation and mission assurance decision making. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | |
2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011 |
CICS |
2011 |
DBLP BibTeX RDF |
|
1 | Anita Zakrzewska, Erik M. Ferragut |
Modeling cyber conflicts using an extended Petri Net formalism. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Erik M. Ferragut, David M. Darmon, Craig Aaron Shue, Stephen Kelley |
Automatic construction of anomaly detectors from graphical models. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ran Liu, Wenjian Luo, Xufa Wang |
A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Justin M. Beaver, Robert M. Patton, Thomas E. Potok |
An approach to the automated determination of host information value. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Amal Ben Hamida, Mohamed Koubàa, Chokri Ben Amar, Henri Nicolas |
Hierarchical traceability of multimedia documents. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yi Hu, Charles E. Frank, James Walden, Emily Crawford, Dhanuja Kasturiratna |
Profiling file repository access patterns for identifying data exfiltration activities. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Paul K. Harmer, Ryan W. Thomas, Brady Christel, Richard K. Martin, Clifton Watson |
Wireless security situation awareness with attack identification decision support. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | James L. Miller, Robert F. Mills, Michael R. Grimaila, Michael W. Haas |
A scalable architecture for improving the timeliness and relevance of cyber incident notifications. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Justin Zhan, Xing Fang, Peter Killion |
Trust optimization in task-oriented social networks. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Omar Al-Ibrahim, Suku Nair |
Security fusion based on state machine compositions. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Harkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva |
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stephen M. Woskov, Michael R. Grimaila, Robert F. Mills, Michael W. Haas |
Design considerations for a case-based reasoning engine for scenario-based cyber incident notification. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dean Lee, Samuel N. Hamilton, Wendy L. Hamilton |
Modeling Cyber Knowledge uncertainty. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sara Hajian, Josep Domingo-Ferrer, Antoni Martínez-Ballesté |
Discrimination prevention in data mining for intrusion and crime detection. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Martin Rehák, Jan Stiborek, Martin Grill |
Intelligence, not integration: Distributed regret minimization for IDS Control. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Senhua Yu, Dipankar Dasgupta |
An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Justin Zhan, Lijo Thomas |
Phishing detection using stochastic learning-based weak estimators. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Justin Zhan, Xing Fang, Naveen Bandaru |
Location privacy protection on social networks. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jennifer T. Jackson, Sadie Creese, Mark S. Leeson |
Biodiversity: A security approach for ad hoc networks. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David L. Hancock, Gary B. Lamont |
Multi agent systems on military networks. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi, Sukumar Nandi |
A host based DES approach for detecting ARP spoofing. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, Qishi Wu |
Security visualization: Cyber security storm map and event correlation. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Bacquet, Nur Zincir-Heywood, Malcolm I. Heywood |
Genetic optimization and hierarchical clustering applied to encrypted traffic identification. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Patrick LaRoche, Nur Zincir-Heywood, Malcolm I. Heywood |
Exploring the state space of an application protocol: A case study of SMTP. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ondrej Linda, Milos Manic, Todd Vollmer, Jason L. Wright |
Fuzzy logic based anomaly detection for embedded network security cyber sensor. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Todd Vollmer, Jim Alves-Foss, Milos Manic |
Autonomous rule creation for intrusion detection. |
CICS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Masanoei Hara, Akira Yamada 0001, Yutaka Miyake |
Visual similarity-based phishing detection without victim site information. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hoin Kim, Inyong Lee, Jaeik Cho, Jongsub Moon |
Visualization of network components for attack analysis. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, Steven K. Rogers |
Using qualia and multi-layered relationships in malware detection. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Suvasini Panigrahi, Shamik Sural, Arun K. Majumdar |
Detection of intrusive activity in databases by combining multiple evidences and belief update. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Qishi Wu, Denise Ferebee, Yunyue Lin, Dipankar Dasgupta |
Visualization of security events using an efficient correlation technique. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Eric S. Imsand, Deon Garrett, John A. Hamilton Jr. |
User identification using GUI manipulation patterns and artificial neural networks. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Li Yang 0001, Feiqiong Liu, Joseph M. Kizza, Raimund K. Ege |
Discovering topics from dark websites. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Joseph A. Brown, Sheridan K. Houghten, Beatrice M. Ombuki-Berman |
Genetic algorithm cryptanalysis of a substitution permutation network. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nikolaos Chatzis, Radu Popescu-Zeletin, Nevil Brownlee |
Email worm detection by wavelet analysis of DNS query streams. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Dipankar Dasgupta |
Tutorial: computational intelligence in cyber security. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka |
Generating mimicry attacks using genetic programming: A benchmarking study. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | |
2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009 |
CICS |
2009 |
DBLP BibTeX RDF |
|
1 | Siddharth Gujral, Estefan Ortiz, Vassilis L. Syrmos |
An unsupervised method for intrusion detection using spectral clustering. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sourour Meharouech, Adel Bouhoula, Tarek Abbes |
Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Eric M. Holloway, Gary B. Lamont, Gilbert L. Peterson |
Network security using self organized multi agent swarms. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Chet Langin, Hongbo Zhou 0001, Shahram Rahimi 0001, Bidyut Gupta, Mehdi R. Zargham, Mohammad R. Sayeh |
A self-organizing map and its modeling for discovering malignant network traffic. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Torri, Winard Britt, John A. Hamilton Jr. |
A compiler classification framework for use in reverse engineering. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Bian 0001, Remzi Seker |
JigDFS: A secure distributed file system. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Manhyun Chung, Jaeik Cho, Jongsub Moon |
An effective denial of service detection method using kernel based data. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Archana Bhattarai, Vasile Rus, Dipankar Dasgupta |
Characterizing comment spam in the blogosphere through content analysis. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Minsoo Lee, Xiaohui Ye, Samuel D. Johnson, Dan Marconett, Chaitanya S. K. Vadrevu, Rao Vemuri 0001, S. J. Ben Yoo |
Cognitive security management with reputation based cooperation schemes in heterogeneous networks. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili 0001 |
Managing complex IT security processes with value based measures. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ran Tao, Li Yang 0001, Lu Peng 0001, Bin Li 0008, Alma Cemerlic |
A case study: Using architectural features to improve sophisticated denial-of-service attack detections. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Riyad Alshammari, Nur Zincir-Heywood |
Generalization of signatures for SSH encrypted traffic identification. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ochul Kwon, Seongjae Bae, Jaeik Cho, Jongsub Moon |
Study of fuzzy clustering methods for malicious codes using native API call frequency. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sahin Renckes, Huseyin Polat 0001, Yusuf Oysal |
Finding the state sequence maximizing P(O; I|λ) on distributed HMMs with Privacy. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rajesh Kumar Pal, Indranil Sengupta 0001 |
Enhancing file data security in linux operating system by integrating secure file system. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|