Authentication, access control, and audit
ACM Computing Surveys (CSUR)
Protecting routing infrastructures from denial of service using cooperative intrusion detection
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
A graph-based system for network-vulnerability analysis
Proceedings of the 1998 workshop on New security paradigms
A high-performance network intrusion detection system
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
An overview of post information warfare data recovery
SAC '98 Proceedings of the 1998 ACM symposium on Applied Computing
An introduction to intrusion detection
Crossroads - Special issue on computer security
Data dependency based logging for defensive information warfare
SAC '00 Proceedings of the 2000 ACM symposium on Applied computing - Volume 1
Transaction fusion in the wake of information warfare
Proceedings of the 2001 ACM symposium on Applied computing
Remus: a security-enhanced operating system
ACM Transactions on Information and System Security (TISSEC)
Anomaly Detection in Embedded Systems
IEEE Transactions on Computers - Special issue on fault-tolerant embedded systems
Simple, state-based approaches to program-based anomaly detection
ACM Transactions on Information and System Security (TISSEC)
Signature-Based Methods for Data Streams
Data Mining and Knowledge Discovery
Panoptis: intrusion detection using a domain-specific language
Journal of Computer Security
Recovery from Malicious Transactions
IEEE Transactions on Knowledge and Data Engineering
Planning for Security Management
IEEE Intelligent Systems
A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Efficient damage assessment and repair in resilient distributed database systems
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
The Specification and Enforcement of Advanced Security Policies
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Proceedings of the 10th ACM conference on Computer and communications security
Fast multipattern search algorithms for intrusion detection
Fundamenta Informaticae - Special issue on computing patterns in strings
Survivable Monitoring in Dynamic Networks
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Incentive-based modeling and inference of attacker intent, objectives, and strategies
ACM Transactions on Information and System Security (TISSEC)
Transaction fusion: a model for data recovery from information attacks
Journal of Intelligent Information Systems - Special issue: Database and applications security
The design and implementation of a self-healing database system
Journal of Intelligent Information Systems - Special issue: Database and applications security
A scalable decision tree system and its application in pattern recognition and intrusion detection
Decision Support Systems
Real-time data attack isolation for commercial database applications
Journal of Network and Computer Applications
ANSS '06 Proceedings of the 39th annual Symposium on Simulation
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
A study in using neural networks for anomaly and misuse detection
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
On preventing intrusions by process behavior monitoring
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
Learning program behavior profiles for intrusion detection
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
International Journal of Information and Computer Security
A real-time intrusion prevention system for commercial enterprise databases and file systems
AIKED'05 Proceedings of the 4th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering Data Bases
A real-time intrusion prevention system for commercial enterprise databases
SEPADS'05 Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems
A real-time intrusion prevention system for commercial enterprise databases and file systems
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
A Role-Based Infrastructure for the Management of Dynamic Communities
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
The implementation and evaluation of a recovery system for workflows
Journal of Network and Computer Applications
Information Sciences: an International Journal
Design of an intrusion detection system based on Bayesian networks
WSEAS Transactions on Computers
Role based access control for a medical database
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
A scalable decision tree system and its application in pattern recognition and intrusion detection
Decision Support Systems
Intrusion detection in computer networks with neural and fuzzy classifiers
ICANN/ICONIP'03 Proceedings of the 2003 joint international conference on Artificial neural networks and neural information processing
Damage assessment and repair in attack resilient distributed database systems
Computer Standards & Interfaces
Collaborative RFID intrusion detection with an artificial immune system
Journal of Intelligent Information Systems
Automating security configuration and administration: an access control perspective
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Scheme for the information sharing between IDSs using JXTA
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A multiple-criteria quadratic programming approach to network intrusion detection
CASDMKM'04 Proceedings of the 2004 Chinese academy of sciences conference on Data Mining and Knowledge Management
Establishing fraud detection patterns based on signatures
ICDM'06 Proceedings of the 6th Industrial Conference on Data Mining conference on Advances in Data Mining: applications in Medicine, Web Mining, Marketing, Image and Signal Mining
A dead-lock free self-healing algorithm for distributed transactional processes
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Expert Systems with Applications: An International Journal
Research: Model for network behaviour under viral attack
Computer Communications
Fast Multipattern Search Algorithms for Intrusion Detection
Fundamenta Informaticae - Computing Patterns in Strings
Review: Intrusion detection system: A comprehensive review
Journal of Network and Computer Applications
Analyzing and defending against web-based malware
ACM Computing Surveys (CSUR)
Administrative evaluation of intrusion detection system
Proceedings of the 2nd annual conference on Research in information technology
Hi-index | 0.00 |