|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 63 occurrences of 49 keywords
|
|
|
Results
Found 75 publication records. Showing 75 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
94 | Kwong H. Yung |
Using Feedback to Improve Masquerade Detection. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
feedback-on-alarm, feedback policy, sequential classifier, online classifier, adaptive classifier, masquerading session, masquerading user, intrusion detection, naive-Bayes classifier, masquerade detection |
78 | Vikram Goyal, Shyam K. Gupta 0001, Anand Gupta |
Malafide Intension and its mapping to Privacy Policy Purposes for Masquerading. |
IDEAS |
2006 |
DBLP DOI BibTeX RDF |
|
78 | James M. Hayes |
Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
64 | Myung-Sub Lee, Chang-Hyeon Park, Young-Ho Sohn |
Differentiated Web Service System through Kernel-Level Realtime Scheduling and Load Balancing. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
Differentiated QoS, masquerading, load balancer, tunneling |
45 | Theodor Richardson |
Preventing Attacks on Back-End Servers using Masquerading/Honeypots. |
SNPD |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Hicham Tout, William Hafner |
Phishpin: An Identity-Based Anti-phishing Approach. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Fernando C. Colón Osorio, Justin Whitney |
A stratified model for security in peer networks: a case for fine grain granularity. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Kwong H. Yung |
Using Self-Consistent Naive-Bayes to Detect Masquerades. |
PAKDD |
2004 |
DBLP DOI BibTeX RDF |
self-consistent naive-Bayes, intrusion detection, anomaly detection, expectation-maximization algorithm, semisupervised learning, masquerade detection |
28 | Jeongeun Park 0002, Taemoon Jeong, Hyeonseong Kim, Taehyun Byun, Seungyoon Shin, Keunjun Choi, Jaewoon Kwon, Taeyoon Lee, Matthew Pan, Sungjoon Choi |
Towards Embedding Dynamic Personas in Interactive Robots: Masquerading Animated Social Kinematics (MASK). |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Jonathan Oliver, Jue Mo, Susmit Yenkar, Raghav Batta, Sekhar Josyoula |
On the Role of Similarity in Detecting Masquerading Files. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Noriichi Kanaya, Shigeru Sato, Shuhei Ootani, Hidenori Takahashi |
Masquerading a Networked Embedded Computer as a Remote Object Using an Asynchronous Remote Object Protocol for a System With Small Servers. |
IEEE Trans. Instrum. Meas. |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Jiaxuan Wu, Shuoqiang Zeng, Wei-Yang Chiu, Peichen Liu, Weizhi Meng 0001, Brooke Lampe |
Delay-masquerading Technique Upheld StrongBox: A Reinforced Side-Channel Protection. |
ICPADS |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Jonathan Oliver, Jue Mo, Susmit Yenkar, Raghav Batta, Sekhar Josyoula |
On the Role of Similarity in Detecting Masquerading Files. |
ML4CS |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Kirby Kuznia, Dhruvil Shah, Gil Speyer, Jason Yalim |
Artificial Intelligence to Classify and Detect Masquerading Users on HPC Systems from Shell Histories. |
PEARC |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Shabbir Ahmed, Marcio Juliato, Christopher Gutierrez, Manoj R. Sastry |
Two-Point Voltage Fingerprinting: Increasing Detectability of ECU Masquerading Attacks. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
28 | Tomohiro Koide, Masato Uchida |
Behind The Mask: Masquerading The Reason for Prediction. |
COMPSAC |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Rikhiya Ghosh |
Counter-masquerading: a logicist-AI approach to interventionist strategies. |
|
2020 |
RDF |
|
28 | Vincenzo DiLuoffo, William R. Michalson, Berk Sunar |
Credential Masquerading and OpenSSL Spy: Exploring ROS 2 using DDS security. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
28 | Jeff Robbins |
If Technology Is a Parasite Masquerading as a Symbiont?Are We the Host? |
IEEE Technol. Soc. Mag. |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Kazuya Kakizaki, Kosuke Yoshida, Tsubasa Takahashi 0001 |
GlassMasq: Adversarial Examples Masquerading in Face Identification Systems with Feature Extractor. |
PST |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Sohail Abbas, Mohammad Faisal, Haseeb Ur Rahman, Muhammad Zahid Khan, Madjid Merabti, Atta ur Rehman Khan |
Masquerading Attacks Detection in Mobile Ad Hoc Networks. |
IEEE Access |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Wenson Chang |
On the Performance of the DNPS-Based Relay Networks under Masquerading Attack. |
Wirel. Commun. Mob. Comput. |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Pedro Ramos, Pierre Funderburk, Jennifer Gebelein |
Social Media and Online Gaming: A Masquerading Funding Source. |
Int. J. Cyber Warf. Terror. |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Yahia Elsayed, Ahmed F. Shosha |
Large scale detection of IDN domain name masquerading. |
eCrime |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Jacob W. Turner |
Tensors masquerading as matchgates: Relaxing planarity restrictions on Pfaffian circuits. |
J. Comput. Syst. Sci. |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Jacob Turner |
Tensors Masquerading as Matchgates: Relaxing Planarity Restrictions on Pfaffian Circuits. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
28 | Anna Lan, Zhen Han, Dawei Zhang, Yichen Jiang, Tianhua Liu, Meihong Li |
An Anonymous Remote Attestation Protocol to Prevent Masquerading Attack. |
UIC/ATC/ScalCom |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Jing Jin, Jeff Offutt, Nan Zheng, Feng Mao, Aaron Koehl, Haining Wang |
Evasive bots masquerading as human beings on the web. |
DSN |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Gundeep Singh Bindra |
Masquerading as a Trustworthy Entity through Portable Document File (PDF) Format. |
SocialCom/PASSAT |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Ranaganayakulu Dhanalakshmi, Chenniappan Chellappan |
Detection and Recognition of File Masquerading for E-mail and Data Security. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Ryuhei Tenmoku, Akito Nishigami, Fumihisa Shibata, Asako Kimura, Hideyuki Tamura |
Balancing Design Freedom and Constraints in Wall Posters Masquerading as AR Tracking Markers. |
HCI (13) |
2009 |
DBLP DOI BibTeX RDF |
geometric registration, poster, semi-fiducial, mixed reality, authoring tool |
28 | Mina Guirguis, Jason Valdez |
Masquerading a Wired Covert Channel into a Wireless-like Channel. |
IPCCC |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Vidyaraman Sankaranarayanan, Suranjan Pramanik, Shambhu J. Upadhyaya |
Detecting Masquerading Users in a Document Management System. |
ICC |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Chuanhuan Yin, Shengfeng Tian, Shaomin Mu |
Using Gap-Insensitive String Kernel to Detect Masquerading. |
ADMA |
2005 |
DBLP DOI BibTeX RDF |
|
28 | James M. Hayes |
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading. |
WETICE |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Ragib Hasan, Marianne Winslett |
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention. |
EDBT |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Jae Yoon Chung, Byungchul Park, Young J. Won, John Strassner, James W. Hong |
Traffic Classification Based on Flow Similarity. |
IPOM |
2009 |
DBLP DOI BibTeX RDF |
Traffic classification, traffic monitoring |
17 | Sang-Ho Na, Kyu-Jin Kim, Mohammad Mehedi Hassan, Eui-nam Huh |
Identity-based secure protocol scheme for wireless sensor network. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
ID-based authentication, clustering, wireless sensor network, authentication, proxy |
17 | Tatsuya Mori, Hideki Tode, Koso Murakami |
Integrated Method for Loss-Resilient Multicast Source Authentication and Data Reconstruction. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Vito Di Gesù, Giosuè Lo Bosco, Jerome H. Friedman |
Intruders pattern identification. |
ICPR |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Desmond Loh Chin Choong, Chia Yuan Cho, Chung Pheng Tan, Ri Seng Lee |
Identifying unique devices through wireless fingerprinting. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
spoof detection, wireless fingerprinting |
17 | Lanlan Hu, Yixian Yang, Xinxin Niu |
Improved Remote User Authentication Scheme Preserving User Anonymity. |
CNSR |
2007 |
DBLP DOI BibTeX RDF |
authentication, anonymity, Smart cards |
17 | Muhammad Torabi Dashti, Srijith Krishnan Nair, Hugo L. Jonker |
Nuovo DRM Paradiso: Towards a Verified Fair DRM Scheme. |
FSEN |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Vito Di Gesù, Giosuè Lo Bosco |
Combining One Class Fuzzy KNN's. |
WILF |
2007 |
DBLP DOI BibTeX RDF |
genetic algorithms, similarity, Fuzzy classification |
17 | Wilson Naik Bhukya, Suneel Kumar Kommuru, Atul Negi |
Masquerade Detection Based Upon GUI User Profiling in Linux Systems. |
ASIAN |
2007 |
DBLP DOI BibTeX RDF |
GUI based Profiling, Mouse events, KDE, Linux Profiling, Intrusion detection, Anomaly detection, One-class SVM, Masquerade detection |
17 | Alok Madhukar, Carey L. Williamson |
A Longitudinal Study of P2P Traffic Classification. |
MASCOTS |
2006 |
DBLP DOI BibTeX RDF |
Peer-to-Peer, Traffic Analysis, Network Traffic Measurement |
17 | Pedro R. M. Inácio, Marek Hajduczenia, Mário M. Freire, Henrique J. A. da Silva, Paulo P. Monteiro |
Preamble Encryption Mechanism for Enhanced Privacy in Ethernet Passive Optical Networks. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
Ethernet Passive Optical Networks, encryption mechanism, EPON frame preamble, Security, privacy, EPON |
17 | Ghazanfar Ali Safdar, Clare McGrath, Máire McLoone |
Limitations of existing wireless networks authentication and key management techniques for MANETs. |
ISCN |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Eun-Jun Yoon, Kee-Young Yoo |
Efficient Mutual Authentication Scheme with Smart Card. |
PRIMA |
2006 |
DBLP DOI BibTeX RDF |
Authentication, Network security, Smart card, Secure protocol, Password |
17 | Daesung Lee 0001, Ki-Chang Kim, Year Back Yoo |
IPBio: Embedding Biometric Data in IP Header for Per-Packet Authentication. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Yuan-Shun Dai, Michael G. Hinchey, Mingrui Qi, Xukai Zou |
Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Jeffrey Erman, Martin F. Arlitt, Anirban Mahanti |
Traffic classification using clustering algorithms. |
MineNet |
2006 |
DBLP DOI BibTeX RDF |
machine learning, classification, unsupervised clustering |
17 | Shyam K. Gupta 0001, Sankalp Dubey, Vikram Goyal, Anand Gupta |
A System to test malafide intension based on privacy violation detection. |
ICDIM |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian |
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Rupinder Gill, Jason Smith 0001, Andrew J. Clark |
Specification-Based Intrusion Detection in WLANs. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Bogdan C. Popescu, Maarten van Steen, Bruno Crispo, Andrew S. Tanenbaum, Jan Sacha, Ihor Kuz |
Securely Replicated Web Documents. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Eun-Jun Yoon, Kee-Young Yoo |
More Efficient and Secure Remote User Authentication Scheme using Smart Cards. |
ICPADS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | William Yurcik, Chao Liu 0001 |
A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. |
CCGRID |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Zhi-gang Liao, Zeng-zhi Li, Yan Chen, Tao Zhan |
A Study of Secure Communications between Mobile Objects. |
ICECCS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Singh 0001, Timothy K. Tsai |
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
Voice over IP system, Cross-protocol detection, Stateful detection, Intrusion detection, SIP, RTP |
17 | Robert Beverly |
A Robust Classifier for Passive TCP/IP Fingerprinting. |
PAM |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Manish Agrawal, Hemant Padmanabhan, Lokesh Pandey, H. Raghav Rao, Shambhu J. Upadhyaya |
A conceptual approach to information security in financial account aggregation. |
ICEC |
2004 |
DBLP DOI BibTeX RDF |
account service providers, identity service providers, scraping, aggregation |
17 | Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato |
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
Layered networks, PCA, Anomaly detection, User behavior, Co-occurrence matrix |
17 | John Felix C, Valli S |
Distributed Group Access Control Architecture for Secure Multicast. |
ADVIS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Bernd Lamparter, Dirk Westhoff |
A Low-Cost Packet Originator Verification for Metering at Access-Routers. |
Networked Group Communication |
2003 |
DBLP DOI BibTeX RDF |
Packet originator verification, wireless last hop, charging support, unpredictable bits |
17 | Hermann Kopetz |
Fault Containment and Error Detection in the Time-Triggered Architecture. |
ISADS |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Mike Jochen, Lisa M. Marvel, Lori L. Pollock |
A Framework for Tamper Detection Marking of Mobile Applications. |
ISSRE |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Arne Wiebalck, Peter T. Breuer, Volker Lindenstruth, Timm M. Steinbeck |
Fault-Tolerant Distributed Mass Storage for LHC Computing. |
CCGRID |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Scott E. Coull, Joel W. Branch, Boleslaw K. Szymanski, Eric Breimer |
Intrusion Detection: A Bioinformatics Approach. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
Intrusion detection, bioinformatics, pattern matching, sequence alignment, masquerade detection |
17 | Ahmed Sameh Mohamed, Dalia Fakhry |
Security in Mobile Agent Systems. |
SAINT |
2002 |
DBLP DOI BibTeX RDF |
Code Mess Up and Encryption, Security, Mobile Agents, Malicious Host |
17 | Michael V. Capps |
Collaborative virtual entertainment: (if you can't beat 'em, join 'em?). |
CVE |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Hung-Yu Lin, Lein Harn |
Authentication Protocols for Personal Communication Systems. |
SIGCOMM |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Cindy Cullen |
Internet vulnerabilities of one-time passcode mechanisms. |
LCN |
1995 |
DBLP DOI BibTeX RDF |
one-time passcode mechanisms, passive attack, one-time passcode server, hacker tools, authentication, security of data, vulnerabilities, hackers, user identification |
17 | Lein Harn, Hung-Yu Lin, Shoubao Yang |
A Software Authentication System for the Prevention of Computer Viruses. |
ACM Conference on Computer Science |
1992 |
DBLP DOI BibTeX RDF |
|
17 | Mohammed Inam Ul Haq |
Insuring individual's privacy from statistical data base users. |
AFIPS National Computer Conference |
1975 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #75 of 75 (100 per page; Change: )
|
|