IEEE Transactions on Software Engineering - Special issue on computer security and privacy
NADIR: an automated system for detecting network intrusion and misuse
Computers and Security
Information Warfare Principles and Operations
Information Warfare Principles and Operations
Distributed Detection and Data Fusion
Distributed Detection and Data Fusion
Mathematical Techniques in Multisensor Data Fusion
Mathematical Techniques in Multisensor Data Fusion
Multisensor Data Fusion
E-mail bombs and countermeasures: cyber attacks on availability and brand integrity
IEEE Network: The Magazine of Global Internetworking
Middleware Support for Voting and Data Fusion
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Unsupervised learning techniques for an intrusion detection system
Proceedings of the 2004 ACM symposium on Applied computing
Towards multisensor data fusion for DoS detection
Proceedings of the 2004 ACM symposium on Applied computing
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
The research on consistency of space/time of IDS
ACM SIGOPS Operating Systems Review
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Proceedings of the 43rd annual Southeast regional conference - Volume 2
One step ahead to multisensor data fusion for DDoS detection
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Modeling network intrusion detection alerts for correlation
ACM Transactions on Information and System Security (TISSEC)
A hierarchical SOM-based intrusion detection system
Engineering Applications of Artificial Intelligence
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Identification of suspicious, unknown event patterns in an event cloud
Proceedings of the 2007 inaugural international conference on Distributed event-based systems
Information fusion for wireless sensor networks: Methods, models, and classifications
ACM Computing Surveys (CSUR)
Diffuse: A topology building engine for wireless sensor networks
Signal Processing
Distance-preserving pseudonymization for timestamps and spatial data
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Principled reasoning and practical applications of alert fusion in intrusion detection systems
Proceedings of the 2008 ACM symposium on Information, computer and communications security
A hybrid artificial immune system and Self Organising Map for network intrusion detection
Information Sciences: an International Journal
Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems
Computer Communications
REFACING: An autonomic approach to network security based on multidimensional trustworthiness
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Novel Situation Awareness Model for Network Systems' Security
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS
Cybernetics and Systems
Multisensor message exchange mechanism
International Journal of Electronic Security and Digital Forensics
Information fusion for computer security: State of the art and open issues
Information Fusion
Information inconsistencies detection using a rule-map technique
Expert Systems with Applications: An International Journal
Network threat assessment based on attribute recognition
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Functional requirements of situational awareness incomputer network security
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Alarm clustering for intrusion detection systems in computer networks
Engineering Applications of Artificial Intelligence
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Network security assessment based on fuzzy sets and rough sets
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A review on system architectures for sensor fusion applications
SEUS'07 Proceedings of the 5th IFIP WG 10.2 international conference on Software technologies for embedded and ubiquitous systems
A comprehensive approach to detect unknown attacks via intrusion detection alerts
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Architecture of distributed intrusion detection system based on anomalies
INES'10 Proceedings of the 14th international conference on Intelligent engineering systems
Designing a data fusion system using a top-down approach
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
A tactical intelligence production model of computer network self-organizing operations
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
Multi-agent reinforcement learning for intrusion detection
ALAMAS'05/ALAMAS'06/ALAMAS'07 Proceedings of the 5th , 6th and 7th European conference on Adaptive and learning agents and multi-agent systems: adaptation and multi-agent learning
Intrusion detection system based on support vector machine active learning and data fusion
ISICA'10 Proceedings of the 5th international conference on Advances in computation and intelligence
Fusing intrusion data for detection and containment
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Data fusion for modern engineering applications: an overview
ICANN'05 Proceedings of the 15th international conference on Artificial neural networks: formal models and their applications - Volume Part II
WNN-based network security situation quantitative prediction method and its optimization
Journal of Computer Science and Technology
SLA-based complementary approach for network intrusion detection
Computer Communications
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Requirements of information reductions for cooperating intrusion detection agents
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
A new data fusion model of intrusion Detection-IDSFP
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
D-S evidence theory and its data fusion application in intrusion detection
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
Information fusion for data dissemination in self-organizing wireless sensor networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
Asynchronous alert correlation in multi-agent intrusion detection systems
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Network security situation evaluation method for distributed denial of service
ACC'11/MMACTEE'11 Proceedings of the 13th IASME/WSEAS international conference on Mathematical Methods and Computational Techniques in Electrical Engineering conference on Applied Computing
Journal of Network and Systems Management
Mobile Agent Based Network Defense System in Enterprise Network
International Journal of Handheld Computing Research
Information Resources Management Journal
Hi-index | 48.22 |