The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for IDSs with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-2000 (16) 2001-2003 (25) 2004 (26) 2005 (29) 2006 (35) 2007 (28) 2008 (24) 2009-2010 (15) 2011-2015 (15) 2016-2020 (18) 2021-2022 (15) 2023-2024 (2)
Publication types (Num. hits)
article(48) incollection(2) inproceedings(197) phdthesis(1)
Venues (Conferences, Journals, ...)
RAID(9) ACM Trans. Inf. Syst. Secur.(6) ACSAC(5) IEEE Secur. Priv.(4) ISCC(4) IWIA(4) ARES(3) AsiaCCS(3) CIS (2)(3) ICC(3) NOMS(3) PDCAT(3) Recent Advances in Intrusion D...(3) WISA(3) AINA(2) CNSR(2) More (+10 of total 186)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 198 occurrences of 120 keywords

Results
Found 248 publication records. Showing 248 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
66Pei-Te Chen, Chi-Sung Laih IDSIC: an intrusion detection system with identification capability. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Identification capability, System managers (SMs), Security auditors (SAs), Fingerprints, Intrusion detection systems (IDSs)
66Yanjiang Yang, Robert H. Deng, Feng Bao 0001 Fortifying password authentication in integrated healthcare delivery systems. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF integrated delivery systems (IDSs), password system, user authentication and key exchange, dictionary attack
62Frédéric Massicotte, Yvan Labiche, Lionel C. Briand Toward Automatic Generation of Intrusion Detection Verification Rules. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Abdulrahman Alharby, Hideki Imai IDS False Alarm Reduction Using Continuous and Discontinuous Patterns. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF alarm reduction, Intrusion detection, sequential patterns
62Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee, Ronald A. Olsson A Methodology for Testing Intrusion Detection Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF computer user simulation, software testing, Intrusion detection, computer security
54Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anomaly intrusion, Key feature, Security, Wireless sensor network, IDSs
49Xin Xu, Yirong Luo A Kernel-Based Reinforcement Learning Approach to Dynamic Behavior Modeling of Intrusion Detection. Search on Bibsonomy ISNN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Peng Ning, Dingbang Xu Hypothesizing and reasoning about attacks missed by intrusion detection systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Intrusion alert correlation, missed attacks, intrusion detection
49Gautam Singaraju, Lawrence Teo, Yuliang Zheng 0001 A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF TIDeS, Environment Profile, Scalability, Fuzzy Logic, Intrusion Detection, Testbed, Evaluation Framework
49Arjita Ghosh, Sandip Sen Agent-Based Distributed Intrusion Alert System. Search on Bibsonomy IWDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
49Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
49R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs. Search on Bibsonomy Int. J. Digit. Crime Forensics The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
49Naeem Khalid Janjua, Farookh Khadeer Hussain Web@IDSS - Argumentation-enabled Web-based IDSS for reasoning over incomplete and conflicting information. Search on Bibsonomy Knowl. Based Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
37Jiong Zhang, Mohammad Zulkernine, Anwar Haque Random-Forests-Based Network Intrusion Detection Systems. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part C The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Yunpeng Chai, Lifeng Sun, Zhihui Du, Sanli Li Load Sharing Based on PSO Algorithm for Isolated Distributed Stream Servers. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios Adaptabilty of a GP Based IDS on Wireless Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Networks, Genetic Programming, Intrusion Detection System, Denial of Service
37Rodrigo Werlinger, Kirstie Hawkey, Kasia Muldner, Pooya Jaferian, Konstantin Beznosov The challenges of using an intrusion detection system: is it worth the effort? Search on Bibsonomy SOUPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaboration, intrusion detection, usable security, security management, qualitative research, organizational factors, security tools
37Monther Aldwairi, Thomas M. Conte, Paul D. Franzon Configurable string matching hardware for speeding up intrusion detection. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF snort accelerator, string matchin, intrusion detection
37Giorgio Giacinto, Roberto Perdisci, Fabio Roli Alarm Clustering for Intrusion Detection Systems in Computer Networks. Search on Bibsonomy MLDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Clustering, Intrusion detection, Computer Security
37Ye Wang, Hussein M. Abdel-Wahab A Correlative Context-Based Framework for Network Intrusion Detection System. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Gerry V. Dozier, Douglas Brown, John Hurley, Krystal Cain Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers. Search on Bibsonomy GECCO (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37Tadeusz Pietraszek Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37Lawrence Teo, Yuliang Zheng 0001, Gail-Joon Ahn Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion Detection Force, Internet Scale, Fault Tolerance, Intrusion Detection, Information Sharing, Recovery, Survivability, Infrastructure
37Srinivas Mukkamala, Andrew H. Sung A Comparative Study of Techniques for Intrusion Detection. Search on Bibsonomy ICTAI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion detection, information security, AI techniques
37Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur Bayesian Event Classification for Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Aiming Wang, Lingxia Liu The Giant Complex System Research Based on Fuzzy Theory and Intelligent Decision Support System IDSS. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF The giant complex system, Fuzzy processing, Artificial intelligence, Decision support system
29Bruce Schneier SIMS: Solution, or Part of the Problem? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network security, intrusion-detection system, IDSs, cost-effectiveness
25I. V. M. de Lima, Joelson A. Degaspari, João Bosco M. Sobral Intrusion detection through artificial neural networks. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Benfano Soewito, Ning Weng Methodology for evaluating string matching algorithms on multiprocessor. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Mohammad Zulkernine, Mathew Graves, Muhammad Umair Ahmed Khan Integrating software specifications into intrusion detection. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Software specification languages, Intrusion detection, State machines, Attack scenarios
25William H. Allen Mixing Wheat with the Chaff: Creating Useful Test Data for IDS Evaluation. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. Rozenblit Alert Fusion for a Computer Host Based Intrusion Detection System. Search on Bibsonomy ECBS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Xin Jin, Sylvia L. Osborn Architecture for Data Collection in Database Intrusion Detection Systems. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF database IDS, intrusion detection, database security
25Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers Alert Verification Evasion Through Server Response Forging. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Alert Verification, Network Intrusion Detection, Exploits, Evasion
25Frédéric Massicotte, Mathieu Couture, Lionel C. Briand, Yvan Labiche Model-Driven, Network-Context Sensitive Intrusion Detection. Search on Bibsonomy MoDELS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF OCL constraints, Intrusion Detection, UML modeling
25Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel Anomalous system call detection. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion detection, Bayesian network, anomaly detection, computer security
25Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric Measuring intrusion detection capability: an information-theoretic approach. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information-theoretic, intrusion detection, performance measurement
25Ramakrishna Raju S., Sreenivasa Rao Construction of Adaptive IDS Through IREP++ and ARM. Search on Bibsonomy ICDCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25José Eduardo M. S. Brandão, Joni da Silva Fraga, Paulo Manoel Mafra, Rafael R. Obelheiro A WS-Based Infrastructure for Integrating Intrusion Detection Systems in Large-Scale Environments. Search on Bibsonomy OTM Conferences (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Emmanuel Hooper An Intelligent Detection and Response Strategy to False Positives and Network Attacks: Operation of Network Quarantine Channels and Feedback Methods to IDS. Search on Bibsonomy SecPerU The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Lizhen Liu, Li Qian, Hantao Song Intelligent Group Decision Support System for Cooperative Works Based on Multi-Agent System. Search on Bibsonomy CSCWD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Hee Suk Seo, Taekyung Kim, Hyungjong Kim 0002 Modeling of Distributed Intrusion Detection Using Fuzzy System. Search on Bibsonomy ICIC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Claudiu Duma, Martin Karresand, Nahid Shahmehri, Germano Caronni A Trust-Aware, P2P-Based Overlay for Intrusion Detection. Search on Bibsonomy DEXA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Jun Wu 0015, Chong-Jun Wang, Jun Wang 0024, Shifu Chen Dynamic Hierarchical Distributed Intrusion Detection System Based on Multi-Agent System. Search on Bibsonomy IAT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Alvaro A. Cárdenas, John S. Baras, Karl Seamon A Framework for the Evaluation of Intrusion Detection Systems. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Emmanuel Hooper Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Mathew Graves, Mohammad Zulkernine Bridging the gap: software specification meets intrusion detector. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack languages, intrusion detection, software security, software specification
25Choon Hean Gan, Arkady B. Zaslavsky, Stephen Giles CAWAnalyser: Enhancing Wireless Intrusion Response with Runtime Context-Awareness. Search on Bibsonomy ICN (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Michael Meier 0001, Sebastian Schmerl, Hartmut König Improving the Efficiency of Misuse Detection. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Junfeng Tian, Weidong Zhao, Ruizhong Du, Zhe Zhang A New Data Fusion Model of Intrusion Detection-IDSFP. Search on Bibsonomy ISPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Situation Estimation, Intrusion Detection, Network Security, Data Fusion, Alert Correlation, D-S Evidence Theory
25Junfeng Tian, Weidong Zhao, Ruizhong Du D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Hee Suk Seo, Tae Ho Cho Application of Fuzzy Logic for Distributed Intrusion Detection. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Xin Xu, Xuening Wang An Adaptive Network Intrusion Detection Method Based on PCA and Support Vector Machines. Search on Bibsonomy ADMA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Junfeng Tian, Weidong Zhao, Ruizhong Du, Zhe Zhang D-S Evidence Theory and its Data Fusion Application in Intrusion Detection. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Fernando Godínez, Dieter Hutter, Raúl Monroy Attribute Reduction for Effective Intrusion Detection. Search on Bibsonomy AWIC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Jeffrey B. Colombe, Gregory Stephens Statistical profiling and visualization for detection of malicious insider attacks on computer networks. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF human-computer interaction, information visualization, anomaly detection, cognitive load
25Fernando Godínez, Dieter Hutter, Raúl Monroy Service Discrimination and Audit File Reduction for Effective Intrusion Detection. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Object Reduction, Intrusion Detection, Dimensionality Reduction, Misuse Detection
25Kwok Ho Law, Lam For Kwok IDS False Alarm Filtering Using KNN Classifier. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Ye Du, Huiqiang Wang, Yonggang Pang IADIDF: A Framework for Intrusion Detection. Search on Bibsonomy GCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. Search on Bibsonomy IEA/AIE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF attack resistant, mobile agents, intrusion detection systems, DoS attacks
25Byoung-Koo Kim, Jong-Su Jang, Tai-Myung Chung Design of Network Security Control System for Cooperative Intrusion Detection. Search on Bibsonomy ICOIN (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Wenke Lee, Salvatore J. Stolfo A framework for constructing features and models for intrusion detection systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF data mining, intrusion detection, feature construction
25Wenke Lee, Salvatore J. Stolfo, Kui W. Mok A Data Mining Framework for Building Intrusion Detection Models. Search on Bibsonomy S&P The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
24Konstantinos Psychogyios, Andreas E. Papadakis, Stavroula Bourou, Nikolaos P. Nikolaou, Apostolos Maniatis, Theodore B. Zahariadis Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data. Search on Bibsonomy Future Internet The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Lijin Shaji, Suji Pramila R Analysis and study of IDSs for cybersecurity vulnerability detection and prevention: A Comprehensive Review. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Junwei Liang 0004, Maode Ma FS-MOEA: A Novel Feature Selection Algorithm for IDSs in Vehicular Networks. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Mozhdeh Norouzi Shad, Mohsen Maadani, Meisam Nesari Moghadam GAPSO-SVM: An IDSS-based Energy-Aware Clustering Routing Algorithm for IoT Perception Layer. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Hassan Chaitou, Thomas Robert 0003, Jean Leneutre, Laurent Pautet Threats to Adversarial Training for IDSs and Mitigation. Search on Bibsonomy SECRYPT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Hassan Chaitou, Thomas Robert 0003, Jean Leneutre, Laurent Pautet Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and Their Mitigation. Search on Bibsonomy ICSBT/SECRYPT (Revised Selected Papers) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Shangyuan Zhuang, Jiyan Sun, Hangsheng Zhang, Xiaohui Kuang, Ling Pang, Haitao Liu 0006, Yinlong Liu StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated Network. Search on Bibsonomy ISCC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Humberto Mendes, Silvio E. Quincozes, Vagner Ereno Quincozes A Web User Interface Tool for Metaheuristics-Based Feature Selection Assessment for IDSs. Search on Bibsonomy CSNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Zhenfeng Lei, Junjun Zhai, Juntao Chen, Wenhao Liu, Shuangyuan Yang, Anwar Ul Haq PFHTS-IDSS: A Hybrid HTS-based Framework for Indonesian Speech Synthesis via Phoneme and Full-context Lab. Search on Bibsonomy Int. J. Pattern Recognit. Artif. Intell. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Zhuoqun Xia, Jingjing Tan, Ke Gu 0002, Weijia Jia 0001 Detection resource allocation scheme for two-layer cooperative IDSs in smart grids. Search on Bibsonomy J. Parallel Distributed Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Junwei Liang 0004, Maode Ma Co-Maintained Database Based on Blockchain for IDSs: A Lifetime Learning Framework. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Jakapan Suaboot, Adil Fahad, Zahir Tari, John C. Grundy, Abdun Naser Mahmood, Abdulmohsen Almalawi, Albert Y. Zomaya, Khalil Drira A Taxonomy of Supervised Learning for IDSs in SCADA Environments. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Ming Zhong 0009, Yajin Zhou, Gang Chen A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Junwei Liang 0004, Maode Ma ECF-MRS: An Efficient and Collaborative Framework With Markov-Based Reputation Scheme for IDSs in Vehicular Networks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Hassan Chaitou, Thomas Robert 0003, Jean Leneutre, Laurent Pautet Assessing adversarial training effect on IDSs and GANs. Search on Bibsonomy CSR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Junwei Liang 0004, Maode Ma An Efficiency-Accuracy Tradeoff for IDSs in VANETs with Markov-based Reputation Scheme. Search on Bibsonomy ICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Roberto Magán-Carrión, Daniel Urda, Ignacio Díaz-Cano, Bernabé Dorronsoro Assessing the Impact of Batch-Based Data Aggregation Techniques for Feature Engineering on Machine Learning-Based Network IDSs. Search on Bibsonomy CISIS-ICEUTE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Gözde Karatas, Önder Demir, Ozgur Koray Sahingoz Increasing the Performance of Machine Learning-Based IDSs on an Imbalanced and Up-to-Date Dataset. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Rana Abou Khamis, Ashraf Matrawy Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
24Junwei Liang 0004, Maode Ma Incremental Database Based on Distributed Ledger Technology for IDSs. Search on Bibsonomy GLOBECOM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Junwei Liang 0004, Maode Ma Design of Feature Selection Algorithm Based on MOEA for IDSs in VANETs. Search on Bibsonomy IECC The full citation details ... 2020 DBLP  BibTeX  RDF
24Rana Abou Khamis, Ashraf Matrawy Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs. Search on Bibsonomy ISNCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Jérôme Cerutti An IDSS to identify and implement actions to protect drinking water sources in land use planning: Exploration and use of knowledge and past experiences. Search on Bibsonomy ICCBR Workshops The full citation details ... 2019 DBLP  BibTeX  RDF
24Ossama Bouziani, Hafssa Benaboud, Achraf Samir Chamkar, Saiida Lazaar A Comparative study of Open Source IDSs according to their Ability to Detect Attacks. Search on Bibsonomy NISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Pan Li 0006, Qiang Liu 0004, Wentao Zhao, Dongxu Wang, Siqi Wang 0001 BEBP: An Poisoning Method Against Machine Learning Based IDSs. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
24Nicola Greggio Anomaly Detection in IDSs by means of unsupervised greedy learning of finite mixture models. Search on Bibsonomy Soft Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Gabriel Maciá-Fernández, José Camacho 0001, Roberto Magán-Carrión, Pedro García-Teodoro, Roberto Therón UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs. Search on Bibsonomy Comput. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Basma Hamrouni, Ahmed Korichi, Abdelhabib Bourouis IDSS-BM: Intelligent Decision Support System for Business Models. Search on Bibsonomy ICSENT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Yifan Dong, Peidong Zhu, Qiang Liu 0004, Yingwen Chen, Peng Xun Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection. Search on Bibsonomy WASA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Pan Li 0006, Wentao Zhao, Qiang Liu 0004, Xiao Liu 0031, Linyuan Yu Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model. Search on Bibsonomy WASA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Pan Li 0006, Qiang Liu 0004, Wentao Zhao, Dongxu Wang, Siqi Wang 0001 Chronic Poisoning against Machine Learning Based IDSs Using Edge Pattern Detection. Search on Bibsonomy ICC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Cedric Escudero, Franck Sicard, Eric Zamaï Process-Aware Model based IDSs for Industrial Control Systems Cybersecurity: Approaches, Limits and Further Research. Search on Bibsonomy ETFA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Yun Zhang, Yang Chen Applying BSC-Based Resource Allocation Strategy to IDSS Intelligent Prediction. Search on Bibsonomy J. Softw. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Tomoaki Sato, Sorawat Chivapreecha, Phichet Moungnoul, Kohji Higuchi An FPGA Architecture for ASIC-FPGA Co-design to Streamline Processing of IDSs. Search on Bibsonomy CTS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Roman Fiedler Beyond gut instincts: Understanding, rating and comparing self-learning IDSs. Search on Bibsonomy CyberSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Khalid Nasr, Anas Abou El Kalam A Novel Metric for the Evaluation of IDSs Effectiveness. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 248 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license