Integrating formalism and pragmatism: architectural security
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Temporal sequence learning and data reduction for anomaly detection
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Temporal sequence learning and data reduction for anomaly detection
ACM Transactions on Information and System Security (TISSEC)
An introduction to intrusion detection
Crossroads - Special issue on computer security
Abstraction-based intrusion detection in distributed environments
ACM Transactions on Information and System Security (TISSEC)
A methodology to detect temporal regularities in user behavior for anomaly detection
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Application of a distributed data mining approach to network intrusion detection
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 3
Computer Networks: The International Journal of Computer and Telecommunications Networking
Using internal sensors and embedded detectors for intrusion detection
Journal of Computer Security
STATL: an attack language for state-based intrusion detection
Journal of Computer Security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection
IEEE Transactions on Computers
Intrusion Detection Based on the Immune Human System
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
LAMBDA: A Language to Model a Database for Detection of Attacks
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
From Declarative Signatures to Misuse IDS
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
NIDS Research Based on Artificial Immunology
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Design of Network Security Control System for Cooperative Intrusion Detection
ICOIN '02 Revised Papers from the International Conference on Information Networking, Wireless Communications Technologies and Network Applications-Part II
Web-Based Tutoring System for Computer Security
PRICAI '02 Proceedings of the 7th Pacific Rim International Conference on Artificial Intelligence: Trends in Artificial Intelligence
Web-Based ITS for Training System Managers on the Computer Intrusion
ITS '02 Proceedings of the 6th International Conference on Intelligent Tutoring Systems
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Log Auditing through Model-Checking
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Lightweight agents for intrusion detection
Journal of Systems and Software
Clustering intrusion detection alarms to support root cause analysis
ACM Transactions on Information and System Security (TISSEC)
NSDF: a computer network system description framework and its application to network security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Fast multipattern search algorithms for intrusion detection
Fundamenta Informaticae - Special issue on computing patterns in strings
A Systematic Approach to Multi-Stage Network Attack Analysis
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Techniques and tools for analyzing intrusion alerts
ACM Transactions on Information and System Security (TISSEC)
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 6 - Volume 07
Preventing race condition attacks on file-systems
Proceedings of the 2005 ACM symposium on Applied computing
Anomaly intrusion detection in wireless sensor networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Detecting and countering system intrusions using software wrappers
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Synthesizing fast intrusion prevention/detection systems from high-level specifications
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Transaction-based anomaly detection
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
Defining categories to select representative attack test-cases
Proceedings of the 2007 ACM workshop on Quality of protection
Insider attack and real-time data mining of user behavior
IBM Journal of Research and Development - Business optimization
A new intrusion detection method based on data-oriented classification of attacks
ACS'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7
International Journal of Information and Computer Security
Detecting denial of service attacks using database queries
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Improving performance of intrusion detection system by applying a new machine learning strategy
CSTST '08 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology
Alert correlation survey: framework and techniques
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
A New Data-Mining Based Approach for Network Intrusion Detection
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
IMAD: in-execution malware analysis and detection
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
Identifying Modeling Errors in Signatures by Model Checking
Proceedings of the 16th International SPIN Workshop on Model Checking Software
Study of intrusion detection system based on improved BP neural networks
First International Workshop on Artificial Intelligence in Grid Computing
Evolving event-driven programs
GECCO '96 Proceedings of the 1st annual conference on Genetic and evolutionary computation
Undermining an anomaly-based intrusion detection system using common exploits
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Anomaly detection scheme using data mining in mobile environment
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Statistic learning and intrusion detection
RSFDGrC'03 Proceedings of the 9th international conference on Rough sets, fuzzy sets, data mining, and granular computing
Cybersecurity for critical infrastructures: attack and defense modeling
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Monitor petri nets for security monitoring
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems
A sense of self for Unix processes
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Through the description of attacks: a multidimensional view
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Estimating accuracy of mobile-masquerader detection using worst-case and best-case scenario
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
An intelligent agent-based framework for collaborative information security
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Application of neural networks in network control and information security
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
Signature-Based approach for intrusion detection
MLDM'05 Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition
An electronic reconfigurable neural architecture for intrusion detection
IWINAC'05 Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II
Improving the efficiency of misuse detection
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Modeling requests among cooperating intrusion detection systems
Computer Communications
Intrusion detection techniques and approaches
Computer Communications
Fast Multipattern Search Algorithms for Intrusion Detection
Fundamenta Informaticae - Computing Patterns in Strings
Collaborative anomaly-based attack detection
IWSOS'07 Proceedings of the Second international conference on Self-Organizing Systems
ATPS: adaptive threat prevention system for high-performance intrusion detection and response
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
A stateful approach to generate synthetic events from Kernel traces
Advances in Software Engineering
Divided two-part adaptive intrusion detection system
Wireless Networks
Model-Based generation of run-time monitors for AUTOSAR
ECMFA'13 Proceedings of the 9th European conference on Modelling Foundations and Applications
Hi-index | 0.00 |