Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
66 | Pei-Te Chen, Chi-Sung Laih |
IDSIC: an intrusion detection system with identification capability. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Identification capability, System managers (SMs), Security auditors (SAs), Fingerprints, Intrusion detection systems (IDSs) |
66 | Yanjiang Yang, Robert H. Deng, Feng Bao 0001 |
Fortifying password authentication in integrated healthcare delivery systems. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
integrated delivery systems (IDSs), password system, user authentication and key exchange, dictionary attack |
62 | Frédéric Massicotte, Yvan Labiche, Lionel C. Briand |
Toward Automatic Generation of Intrusion Detection Verification Rules. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Abdulrahman Alharby, Hideki Imai |
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
alarm reduction, Intrusion detection, sequential patterns |
62 | Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee, Ronald A. Olsson |
A Methodology for Testing Intrusion Detection Systems. |
IEEE Trans. Software Eng. |
1996 |
DBLP DOI BibTeX RDF |
computer user simulation, software testing, Intrusion detection, computer security |
54 | Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao |
Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Anomaly intrusion, Key feature, Security, Wireless sensor network, IDSs |
49 | Xin Xu, Yirong Luo |
A Kernel-Based Reinforcement Learning Approach to Dynamic Behavior Modeling of Intrusion Detection. |
ISNN (1) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Peng Ning, Dingbang Xu |
Hypothesizing and reasoning about attacks missed by intrusion detection systems. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
Intrusion alert correlation, missed attacks, intrusion detection |
49 | Gautam Singaraju, Lawrence Teo, Yuliang Zheng 0001 |
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
TIDeS, Environment Profile, Scalability, Fuzzy Logic, Intrusion Detection, Testbed, Evaluation Framework |
49 | Arjita Ghosh, Sandip Sen |
Agent-Based Distributed Intrusion Alert System. |
IWDC |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo |
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
|
49 | R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran |
A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs. |
Int. J. Digit. Crime Forensics |
2019 |
DBLP DOI BibTeX RDF |
|
49 | Naeem Khalid Janjua, Farookh Khadeer Hussain |
Web@IDSS - Argumentation-enabled Web-based IDSS for reasoning over incomplete and conflicting information. |
Knowl. Based Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
37 | Jiong Zhang, Mohammad Zulkernine, Anwar Haque |
Random-Forests-Based Network Intrusion Detection Systems. |
IEEE Trans. Syst. Man Cybern. Part C |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Yunpeng Chai, Lifeng Sun, Zhihui Du, Sanli Li |
Load Sharing Based on PSO Algorithm for Isolated Distributed Stream Servers. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios |
Adaptabilty of a GP Based IDS on Wireless Networks. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Wireless Networks, Genetic Programming, Intrusion Detection System, Denial of Service |
37 | Rodrigo Werlinger, Kirstie Hawkey, Kasia Muldner, Pooya Jaferian, Konstantin Beznosov |
The challenges of using an intrusion detection system: is it worth the effort? |
SOUPS |
2008 |
DBLP DOI BibTeX RDF |
collaboration, intrusion detection, usable security, security management, qualitative research, organizational factors, security tools |
37 | Monther Aldwairi, Thomas M. Conte, Paul D. Franzon |
Configurable string matching hardware for speeding up intrusion detection. |
SIGARCH Comput. Archit. News |
2005 |
DBLP DOI BibTeX RDF |
snort accelerator, string matchin, intrusion detection |
37 | Giorgio Giacinto, Roberto Perdisci, Fabio Roli |
Alarm Clustering for Intrusion Detection Systems in Computer Networks. |
MLDM |
2005 |
DBLP DOI BibTeX RDF |
Clustering, Intrusion detection, Computer Security |
37 | Ye Wang, Hussein M. Abdel-Wahab |
A Correlative Context-Based Framework for Network Intrusion Detection System. |
ISCC |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Gerry V. Dozier, Douglas Brown, John Hurley, Krystal Cain |
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers. |
GECCO (1) |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Tadeusz Pietraszek |
Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Lawrence Teo, Yuliang Zheng 0001, Gail-Joon Ahn |
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
Intrusion Detection Force, Internet Scale, Fault Tolerance, Intrusion Detection, Information Sharing, Recovery, Survivability, Infrastructure |
37 | Srinivas Mukkamala, Andrew H. Sung |
A Comparative Study of Techniques for Intrusion Detection. |
ICTAI |
2003 |
DBLP DOI BibTeX RDF |
intrusion detection, information security, AI techniques |
37 | Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur |
Bayesian Event Classification for Intrusion Detection. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
37 | Aiming Wang, Lingxia Liu |
The Giant Complex System Research Based on Fuzzy Theory and Intelligent Decision Support System IDSS. |
ISIP |
2008 |
DBLP DOI BibTeX RDF |
The giant complex system, Fuzzy processing, Artificial intelligence, Decision support system |
29 | Bruce Schneier |
SIMS: Solution, or Part of the Problem? |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
network security, intrusion-detection system, IDSs, cost-effectiveness |
25 | I. V. M. de Lima, Joelson A. Degaspari, João Bosco M. Sobral |
Intrusion detection through artificial neural networks. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Benfano Soewito, Ning Weng |
Methodology for evaluating string matching algorithms on multiprocessor. |
AICCSA |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Mohammad Zulkernine, Mathew Graves, Muhammad Umair Ahmed Khan |
Integrating software specifications into intrusion detection. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Software specification languages, Intrusion detection, State machines, Attack scenarios |
25 | William H. Allen |
Mixing Wheat with the Chaff: Creating Useful Test Data for IDS Evaluation. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. Rozenblit |
Alert Fusion for a Computer Host Based Intrusion Detection System. |
ECBS |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Xin Jin, Sylvia L. Osborn |
Architecture for Data Collection in Database Intrusion Detection Systems. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
database IDS, intrusion detection, database security |
25 | Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers |
Alert Verification Evasion Through Server Response Forging. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Alert Verification, Network Intrusion Detection, Exploits, Evasion |
25 | Frédéric Massicotte, Mathieu Couture, Lionel C. Briand, Yvan Labiche |
Model-Driven, Network-Context Sensitive Intrusion Detection. |
MoDELS |
2007 |
DBLP DOI BibTeX RDF |
OCL constraints, Intrusion Detection, UML modeling |
25 | Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel |
Anomalous system call detection. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
Intrusion detection, Bayesian network, anomaly detection, computer security |
25 | Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric |
Measuring intrusion detection capability: an information-theoretic approach. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
information-theoretic, intrusion detection, performance measurement |
25 | Ramakrishna Raju S., Sreenivasa Rao |
Construction of Adaptive IDS Through IREP++ and ARM. |
ICDCN |
2006 |
DBLP DOI BibTeX RDF |
|
25 | José Eduardo M. S. Brandão, Joni da Silva Fraga, Paulo Manoel Mafra, Rafael R. Obelheiro |
A WS-Based Infrastructure for Integrating Intrusion Detection Systems in Large-Scale Environments. |
OTM Conferences (1) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Emmanuel Hooper |
An Intelligent Detection and Response Strategy to False Positives and Network Attacks: Operation of Network Quarantine Channels and Feedback Methods to IDS. |
SecPerU |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Lizhen Liu, Li Qian, Hantao Song |
Intelligent Group Decision Support System for Cooperative Works Based on Multi-Agent System. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Hee Suk Seo, Taekyung Kim, Hyungjong Kim 0002 |
Modeling of Distributed Intrusion Detection Using Fuzzy System. |
ICIC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Claudiu Duma, Martin Karresand, Nahid Shahmehri, Germano Caronni |
A Trust-Aware, P2P-Based Overlay for Intrusion Detection. |
DEXA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Jun Wu 0015, Chong-Jun Wang, Jun Wang 0024, Shifu Chen |
Dynamic Hierarchical Distributed Intrusion Detection System Based on Multi-Agent System. |
IAT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Alvaro A. Cárdenas, John S. Baras, Karl Seamon |
A Framework for the Evaluation of Intrusion Detection Systems. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Emmanuel Hooper |
Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Mathew Graves, Mohammad Zulkernine |
Bridging the gap: software specification meets intrusion detector. |
PST |
2006 |
DBLP DOI BibTeX RDF |
attack languages, intrusion detection, software security, software specification |
25 | Choon Hean Gan, Arkady B. Zaslavsky, Stephen Giles |
CAWAnalyser: Enhancing Wireless Intrusion Response with Runtime Context-Awareness. |
ICN (1) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Michael Meier 0001, Sebastian Schmerl, Hartmut König |
Improving the Efficiency of Misuse Detection. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Junfeng Tian, Weidong Zhao, Ruizhong Du, Zhe Zhang |
A New Data Fusion Model of Intrusion Detection-IDSFP. |
ISPA |
2005 |
DBLP DOI BibTeX RDF |
Situation Estimation, Intrusion Detection, Network Security, Data Fusion, Alert Correlation, D-S Evidence Theory |
25 | Junfeng Tian, Weidong Zhao, Ruizhong Du |
D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Hee Suk Seo, Tae Ho Cho |
Application of Fuzzy Logic for Distributed Intrusion Detection. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Xin Xu, Xuening Wang |
An Adaptive Network Intrusion Detection Method Based on PCA and Support Vector Machines. |
ADMA |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Junfeng Tian, Weidong Zhao, Ruizhong Du, Zhe Zhang |
D-S Evidence Theory and its Data Fusion Application in Intrusion Detection. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Fernando Godínez, Dieter Hutter, Raúl Monroy |
Attribute Reduction for Effective Intrusion Detection. |
AWIC |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Jeffrey B. Colombe, Gregory Stephens |
Statistical profiling and visualization for detection of malicious insider attacks on computer networks. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
human-computer interaction, information visualization, anomaly detection, cognitive load |
25 | Fernando Godínez, Dieter Hutter, Raúl Monroy |
Service Discrimination and Audit File Reduction for Effective Intrusion Detection. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
Object Reduction, Intrusion Detection, Dimensionality Reduction, Misuse Detection |
25 | Kwok Ho Law, Lam For Kwok |
IDS False Alarm Filtering Using KNN Classifier. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Ye Du, Huiqiang Wang, Yonggang Pang |
IADIDF: A Framework for Intrusion Detection. |
GCC |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham |
Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. |
IEA/AIE |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam |
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. |
IPDPS |
2002 |
DBLP DOI BibTeX RDF |
attack resistant, mobile agents, intrusion detection systems, DoS attacks |
25 | Byoung-Koo Kim, Jong-Su Jang, Tai-Myung Chung |
Design of Network Security Control System for Cooperative Intrusion Detection. |
ICOIN (2) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Wenke Lee, Salvatore J. Stolfo |
A framework for constructing features and models for intrusion detection systems. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
data mining, intrusion detection, feature construction |
25 | Wenke Lee, Salvatore J. Stolfo, Kui W. Mok |
A Data Mining Framework for Building Intrusion Detection Models. |
S&P |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Konstantinos Psychogyios, Andreas E. Papadakis, Stavroula Bourou, Nikolaos P. Nikolaou, Apostolos Maniatis, Theodore B. Zahariadis |
Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data. |
Future Internet |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Lijin Shaji, Suji Pramila R |
Analysis and study of IDSs for cybersecurity vulnerability detection and prevention: A Comprehensive Review. |
ICCCNT |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Junwei Liang 0004, Maode Ma |
FS-MOEA: A Novel Feature Selection Algorithm for IDSs in Vehicular Networks. |
IEEE Trans. Intell. Transp. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Mozhdeh Norouzi Shad, Mohsen Maadani, Meisam Nesari Moghadam |
GAPSO-SVM: An IDSS-based Energy-Aware Clustering Routing Algorithm for IoT Perception Layer. |
Wirel. Pers. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Hassan Chaitou, Thomas Robert 0003, Jean Leneutre, Laurent Pautet |
Threats to Adversarial Training for IDSs and Mitigation. |
SECRYPT |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Hassan Chaitou, Thomas Robert 0003, Jean Leneutre, Laurent Pautet |
Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and Their Mitigation. |
ICSBT/SECRYPT (Revised Selected Papers) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Shangyuan Zhuang, Jiyan Sun, Hangsheng Zhang, Xiaohui Kuang, Ling Pang, Haitao Liu 0006, Yinlong Liu |
StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated Network. |
ISCC |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Humberto Mendes, Silvio E. Quincozes, Vagner Ereno Quincozes |
A Web User Interface Tool for Metaheuristics-Based Feature Selection Assessment for IDSs. |
CSNet |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Zhenfeng Lei, Junjun Zhai, Juntao Chen, Wenhao Liu, Shuangyuan Yang, Anwar Ul Haq |
PFHTS-IDSS: A Hybrid HTS-based Framework for Indonesian Speech Synthesis via Phoneme and Full-context Lab. |
Int. J. Pattern Recognit. Artif. Intell. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Zhuoqun Xia, Jingjing Tan, Ke Gu 0002, Weijia Jia 0001 |
Detection resource allocation scheme for two-layer cooperative IDSs in smart grids. |
J. Parallel Distributed Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Junwei Liang 0004, Maode Ma |
Co-Maintained Database Based on Blockchain for IDSs: A Lifetime Learning Framework. |
IEEE Trans. Netw. Serv. Manag. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Jakapan Suaboot, Adil Fahad, Zahir Tari, John C. Grundy, Abdun Naser Mahmood, Abdulmohsen Almalawi, Albert Y. Zomaya, Khalil Drira |
A Taxonomy of Supervised Learning for IDSs in SCADA Environments. |
ACM Comput. Surv. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Ming Zhong 0009, Yajin Zhou, Gang Chen |
A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network. |
Secur. Commun. Networks |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Junwei Liang 0004, Maode Ma |
ECF-MRS: An Efficient and Collaborative Framework With Markov-Based Reputation Scheme for IDSs in Vehicular Networks. |
IEEE Trans. Inf. Forensics Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Hassan Chaitou, Thomas Robert 0003, Jean Leneutre, Laurent Pautet |
Assessing adversarial training effect on IDSs and GANs. |
CSR |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Junwei Liang 0004, Maode Ma |
An Efficiency-Accuracy Tradeoff for IDSs in VANETs with Markov-based Reputation Scheme. |
ICC |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Roberto Magán-Carrión, Daniel Urda, Ignacio Díaz-Cano, Bernabé Dorronsoro |
Assessing the Impact of Batch-Based Data Aggregation Techniques for Feature Engineering on Machine Learning-Based Network IDSs. |
CISIS-ICEUTE |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Gözde Karatas, Önder Demir, Ozgur Koray Sahingoz |
Increasing the Performance of Machine Learning-Based IDSs on an Imbalanced and Up-to-Date Dataset. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Rana Abou Khamis, Ashraf Matrawy |
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
24 | Junwei Liang 0004, Maode Ma |
Incremental Database Based on Distributed Ledger Technology for IDSs. |
GLOBECOM |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Junwei Liang 0004, Maode Ma |
Design of Feature Selection Algorithm Based on MOEA for IDSs in VANETs. |
IECC |
2020 |
DBLP BibTeX RDF |
|
24 | Rana Abou Khamis, Ashraf Matrawy |
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs. |
ISNCC |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Jérôme Cerutti |
An IDSS to identify and implement actions to protect drinking water sources in land use planning: Exploration and use of knowledge and past experiences. |
ICCBR Workshops |
2019 |
DBLP BibTeX RDF |
|
24 | Ossama Bouziani, Hafssa Benaboud, Achraf Samir Chamkar, Saiida Lazaar |
A Comparative study of Open Source IDSs according to their Ability to Detect Attacks. |
NISS |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Pan Li 0006, Qiang Liu 0004, Wentao Zhao, Dongxu Wang, Siqi Wang 0001 |
BEBP: An Poisoning Method Against Machine Learning Based IDSs. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
24 | Nicola Greggio |
Anomaly Detection in IDSs by means of unsupervised greedy learning of finite mixture models. |
Soft Comput. |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Gabriel Maciá-Fernández, José Camacho 0001, Roberto Magán-Carrión, Pedro García-Teodoro, Roberto Therón |
UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs. |
Comput. Secur. |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Basma Hamrouni, Ahmed Korichi, Abdelhabib Bourouis |
IDSS-BM: Intelligent Decision Support System for Business Models. |
ICSENT |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Yifan Dong, Peidong Zhu, Qiang Liu 0004, Yingwen Chen, Peng Xun |
Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection. |
WASA |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Pan Li 0006, Wentao Zhao, Qiang Liu 0004, Xiao Liu 0031, Linyuan Yu |
Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model. |
WASA |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Pan Li 0006, Qiang Liu 0004, Wentao Zhao, Dongxu Wang, Siqi Wang 0001 |
Chronic Poisoning against Machine Learning Based IDSs Using Edge Pattern Detection. |
ICC |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Cedric Escudero, Franck Sicard, Eric Zamaï |
Process-Aware Model based IDSs for Industrial Control Systems Cybersecurity: Approaches, Limits and Further Research. |
ETFA |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Yun Zhang, Yang Chen |
Applying BSC-Based Resource Allocation Strategy to IDSS Intelligent Prediction. |
J. Softw. |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Tomoaki Sato, Sorawat Chivapreecha, Phichet Moungnoul, Kohji Higuchi |
An FPGA Architecture for ASIC-FPGA Co-design to Streamline Processing of IDSs. |
CTS |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Roman Fiedler |
Beyond gut instincts: Understanding, rating and comparing self-learning IDSs. |
CyberSA |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Khalid Nasr, Anas Abou El Kalam |
A Novel Metric for the Evaluation of IDSs Effectiveness. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|