On pseudonymization of audit data for intrusion detection
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Intrusion Detection through Behavioral Data
IDA '99 Proceedings of the Third International Symposium on Advances in Intelligent Data Analysis
Real-time network-based anomaly intrusion detection
Real-time system security
Intrusion detection through dynamic software measurement
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
Identity verification through dynamic keystroke analysis
Intelligent Data Analysis
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
Wireless Personal Communications: An International Journal
A Composite Privacy Leakage Indicator
Wireless Personal Communications: An International Journal
Improving the efficiency of misuse detection
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Decision-cache based XACML authorisation and anonymisation for XML documents
Computer Standards & Interfaces
Authorization architectures for privacy-respecting surveillance
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |