Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("intrusion detection")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1305

  • Page / 53
Export

Selection :

  • and

New Directions in Intrusion Detection and Alert CorrelationME, Ludovic; DEBAR, Hervé.Information interaction intelligence. 2010, Vol 10, Num 1, pp 11-31, issn 1630-649X, 21 p.Article

Malware Detection and Prevention System Based on Multi-Stage RulesALAZAB, Ammar; HOBBS, Michael; ABAWAJY, Jemal et al.International journal of information security and privacy. 2013, Vol 7, Num 2, pp 29-43, issn 1930-1650, 15 p.Article

A risk-sensitive intrusion detection modelHAI JIN; JIANHUA SUN; HAO CHEN et al.Lecture notes in computer science. 2003, pp 107-117, issn 0302-9743, isbn 3-540-00716-4, 11 p.Conference Paper

RAID 2003 : recent advances in intrusion detection (Pittsburgh PA, 8-10 September 2003)Vigna, Giovanni; Jonsson, Erland; Kruegel, Chirstopher et al.Lecture notes in computer science. 2003, issn 0302-9743, isbn 3-540-40878-9, X, 237 p, isbn 3-540-40878-9Conference Proceedings

RAID 2002 : recent advances in intrusion detection (Zurich, 16-18 October 2002)Wespi, Andreas; Vigna, Giovanni; Deri, Luca et al.Lecture notes in computer science. 2002, issn 0302-9743, isbn 3-540-00020-8, X, 326 p, isbn 3-540-00020-8Conference Proceedings

Intrusion detection system: A comprehensive reviewLIAO, Hung-Jen; LIN, Chun-Hung Richard; LIN, Ying-Chih et al.Journal of network and computer applications. 2013, Vol 36, Num 1, pp 16-24, issn 1084-8045, 9 p.Article

An Intrusion Detection System for IEC61850 Automated SubstationsUPEKA KANCHANA PREMARATNE; SAMARABANDU, Jagath; SIDHU, Tarlochan S et al.IEEE transactions on power delivery. 2010, Vol 25, Num 4, pp 2376-2383, issn 0885-8977, 8 p.Article

La détection d'intrusions : les outils doivent coopérer : La sécurité des systèmes d'information = The intrusion detection: the tools have to cooperateVIE, Ludovic; MARRAKCHI, Zakia; MICHEL, Cédric et al.REE. Revue de l'électricité et de l'électronique. 2001, Num 5, pp 56-59, issn 1265-6534Article

Unintended invitation : Organizational Wi-Fi use by external roaming usersSIPIOR, Janice C; WARD, Burke T.Communications of the ACM. 2007, Vol 50, Num 8, pp 72-77, issn 0001-0782, 6 p.Article

Undermining an anomaly-based intrusion detection system using common exploitsTAN, Kymie M. C; KILLOURHY, Kevin S; MAXION, Roy A et al.Lecture notes in computer science. 2002, pp 54-73, issn 0302-9743, isbn 3-540-00020-8, 20 p.Conference Paper

Data mining, intrusion detection, information assurance, and data networks security 2008 (17-18 March 2008, Orlando, Florida, USA)Dasarathy, Belur V.Proceedings of SPIE, the International Society for Optical Engineering. 2008, Vol 6973, issn 0277-786X, isbn 978-0-8194-7164-2 0-8194-7164-X, 1 v. (various pagings), isbn 978-0-8194-7164-2 0-8194-7164-XConference Proceedings

Protecting security policies in ubiquitous environments using one-way functionsKVARNSTRÖM, Hakan; HEDBOM, Hans; JONSSON, Erland et al.Lecture notes in computer science. 2004, pp 71-85, issn 0302-9743, isbn 3-540-20887-9, 15 p.Conference Paper

Analyzing intensive intrusion alerts via correlationPENG NING; YUN CUI; REEVES, Douglas S et al.Lecture notes in computer science. 2002, pp 74-94, issn 0302-9743, isbn 3-540-00020-8, 21 p.Conference Paper

A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inferenceXUAN DAU HOANG; JIANKUN HU; BERTOK, Peter et al.Journal of network and computer applications. 2009, Vol 32, Num 6, pp 1219-1228, issn 1084-8045, 10 p.Article

Data mining, intrusion detection, information security and assurance, and data networks security 2009 (15-16 April 2009, Orlando, Florida, United States)Dasarathy, Belur V.Proceedings of SPIE, the International Society for Optical Engineering. 2009, Vol 7344, issn 0277-786X, isbn 978-0-8194-7610-4 0-8194-7610-2, 1Vol, various pagings, isbn 978-0-8194-7610-4 0-8194-7610-2Conference Proceedings

E-mail worm detection using the analysis of behaviorTAO JIANG; KIM, Wonil; LHEE, Kyungsuk et al.Lecture notes in computer science. 2005, pp 348-356, issn 0302-9743, isbn 3-540-30999-3, 1Vol, 9 p.Conference Paper

A generic model and architecture for automated auditingHASAN; STILLER, Burkhard.Lecture notes in computer science. 2005, pp 121-132, issn 0302-9743, isbn 3-540-29388-4, 1Vol, 12 p.Conference Paper

Why the first glass of wine is better than the seventhBERSINI, Hugues.Lecture notes in computer science. 2005, pp 100-111, issn 0302-9743, isbn 3-540-28175-4, 12 p.Conference Paper

Detecting malicious software by monitoring anomalous Windows registry accessesAPAP, Frank; HONIG, Andrew; HERSHKOP, Shlomo et al.Lecture notes in computer science. 2002, pp 36-53, issn 0302-9743, isbn 3-540-00020-8, 18 p.Conference Paper

RAID 2004 : recent advances in intreusion detection (Sophia Antipolis, 15-17 September 2004)Jonsson, Erland; Valdes, Alfonso; Almgren, Magnus et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-23123-4, XII, 314 p, isbn 3-540-23123-4Conference Proceedings

Security and privacy (Berkeley CA, 12-15 May 2002)Proceedings - IEEE Symposium on Security and Privacy. 2002, issn 1081-6011, isbn 0-7695-1543-6, IX, 295 p, isbn 0-7695-1543-6Conference Proceedings

Representation of weather and terrain effects on intrusion detectionPECK, Lindamae.International Carnahan conference on security technology. 2002, pp 179-190, isbn 0-7803-7436-3, 12 p.Conference Paper

Capturing an intruder in the pyramidSHAREGHI, Pooya; IMANI, Navid; SARBAZI-AZAD, Hamid et al.Lecture notes in computer science. 2006, pp 580-590, issn 0302-9743, isbn 3-540-34166-8, 1Vol, 11 p.Conference Paper

Using attack trees to identify malicious attacks from authorized insidersRAY, Indrajit; POOLSAPASSIT, Nayot.Lecture notes in computer science. 2005, pp 231-246, issn 0302-9743, isbn 3-540-28963-1, 1Vol, 16 p.Conference Paper

Data mining, intrusion detection, information assurance, and data networks security 2006 (17-18 April 2006, Kissimmee, Florida, USA)Dasarathy, Belur V.Proceedings of SPIE, the International Society for Optical Engineering. 2006, issn 0277-786X, isbn 0-8194-6297-7, 1Vol, various pagings, isbn 0-8194-6297-7Conference Proceedings

  • Page / 53