×

Found 178 Documents (Results 1–100)

100
MathJax

Resource-aware intrusion response based on deep reinforcement learning for software-defined Internet-of-battle-things. (English) Zbl 07526414

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 389-409 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Evading machine learning based network intrusion detection systems with GANs. (English) Zbl 07526411

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 335-356 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Continuous authentication security games. (English) Zbl 07526405

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 180-203 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Dimensionality reduction and visualization of network intrusion detection data. (English) Zbl 1443.68040

Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 441-455 (2019).
MSC:  68M25 68M10 68T05
PDF BibTeX XML Cite
Full Text: DOI Link

Enhancing intelligent alarm reduction for distributed intrusion detection systems via edge computing. (English) Zbl 06944277

Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 759-767 (2018).
MSC:  68P25
PDF BibTeX XML Cite
Full Text: DOI

Intrusion-resilient public auditing protocol for data storage in cloud computing. (English) Zbl 06944256

Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 399-416 (2018).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Optimal thresholds for anomaly-based intrusion detection in dynamical environments. (English) Zbl 1453.91032

Zhu, Quanyan (ed.) et al., Decision and game theory for security. 7th international conference, GameSec 2016, New York, NY, USA, November 2–4, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9996, 415-434 (2016).
MSC:  91A43 91A80 68M25
PDF BibTeX XML Cite
Full Text: DOI arXiv

Improving intrusion detection systems for wireless sensor networks. (English) Zbl 1404.94115

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 343-360 (2014).
MSC:  94A60 68P25 68M12
PDF BibTeX XML Cite
Full Text: DOI

Detection of HTTP-GET attack with clustering and information theoretic measurements. (English) Zbl 1317.94098

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 5th international symposium, FPS 2012, Montreal, QC, Canada, October 25–26, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37118-9/pbk). Lecture Notes in Computer Science 7743, 45-61 (2013).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Indices of power in optimal IDS default configuration: theory and examples. (English) Zbl 1349.68018

Baras, John S. (ed.) et al., Decision and game theory for security. Second international conference, GameSec 2011, College Park, MD, Maryland, USA, November 14–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25279-2/pbk). Lecture Notes in Computer Science 7037, 7-21 (2011).
PDF BibTeX XML Cite
Full Text: DOI arXiv Link

Network statistics in function of statistical intrusion detection. (English) Zbl 1209.68014

Rudas, Imre J.(ed) et al., Computational intelligence and informatics. Selected papers based on the presentations at the 10th international symposium of Hungarian researchers on computational intelligence and informatics, Budapest, Hungary, November 12–14, 2009. Berlin: Springer (ISBN 978-3-642-15219-1/hbk; 978-3-642-15220-7/ebook). Studies in Computational Intelligence 313, 27-35 (2010).
MSC:  68M10 68M99
PDF BibTeX XML Cite
Full Text: DOI

A deviation based outlier intrusion detection system. (English) Zbl 1207.68061

Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 395-401 (2010).
MSC:  68M10 68T05 68M11
PDF BibTeX XML Cite
Full Text: DOI

Detection and classification of DDoS attacks using fuzzy inference system. (English) Zbl 1210.68021

Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 242-252 (2010).
MSC:  68M10
PDF BibTeX XML Cite
Full Text: DOI

Fuzzy rule-base based intrusion detection system on application layer. (English) Zbl 1210.68020

Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 27-36 (2010).
MSC:  68M10
PDF BibTeX XML Cite
Full Text: DOI

Novelty-aware attack recognition - intrusion detection with organic computing techniques. (English) Zbl 1202.68081

Hinchey, Mike (ed.) et al., Distributed, parallel and biologically inspired systems. 7th IFIP TC 10 working conference, DIPES 2010, and 3rd IFIP TC 10 international conference biologically-inspired collaborative computing, BICC 2010, held as part of WCC 2010, Brisbane, Australia, September 20–23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15233-7/hbk; 978-3-642-15234-4/ebook). IFIP Advances in Information and Communication Technology 329, 242-253 (2010).
MSC:  68M99 68M14
PDF BibTeX XML Cite
Full Text: DOI

Intrusion detections in collaborative organizations by preserving privacy. (English) Zbl 1198.68086

Guillet, F. (ed.) et al., Advances in knowledge discovery and management. Selected papers based on the presentations at the “Extraction et gestion des connaissances” conference 2009 (EGC), Strasbourg, France, January 2009. Berlin: Springer (ISBN 978-3-642-00579-4/hbk). Studies in Computational Intelligence 292, 235-247 (2010).
MSC:  68M10
PDF BibTeX XML Cite
Full Text: DOI Link

Mining common outliers for intrusion detection. (English) Zbl 1202.68122

Guillet, F. (ed.) et al., Advances in knowledge discovery and management. Selected papers based on the presentations at the “Extraction et gestion des connaissances” conference 2009 (EGC), Strasbourg, France, January 2009. Berlin: Springer (ISBN 978-3-642-00579-4/hbk). Studies in Computational Intelligence 292, 217-234 (2010).
MSC:  68P05 68M99 68T10
PDF BibTeX XML Cite
Full Text: DOI Link

Tree-structure based hybrid computational intelligence. Theoretical foundations and applications. (English) Zbl 1195.68076

Intelligent Systems Reference Library 2. Berlin: Springer (ISBN 978-3-642-04738-1/hbk; 978-3-642-26120-6/pbk; 978-3-642-04739-8/ebook). xiv, 206 p. (2010).
PDF BibTeX XML Cite
Full Text: DOI

Experiment research of automatic deception model based on autonomic computing. (English) Zbl 1209.68016

Park, Jong Hyuk (ed.) et al., Advances in information security and its application. Third international conference, ISA 2009, Seoul, Korea, June 25–27, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02632-4/pbk; 978-3-642-02633-1/ebook). Communications in Computer and Information Science 36, 98-104 (2009).
MSC:  68M10
PDF BibTeX XML Cite
Full Text: DOI

Behavioural biometrics hardware based on bioinformatics matching. (English) Zbl 1191.68119

Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 171-178 (2009).
MSC:  68M99
PDF BibTeX XML Cite
Full Text: DOI

Multiagent systems for network intrusion detection: A review. (English) Zbl 1191.68727

Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 143-154 (2009).
MSC:  68T42 68M10
PDF BibTeX XML Cite
Full Text: DOI Link

Towards Ontology-based intelligent model for intrusion detection and prevention. (English) Zbl 1191.68504

Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 109-116 (2009).
PDF BibTeX XML Cite
Full Text: DOI

Detection of database intrusion using a two-stage fuzzy system. (English) Zbl 1343.68070

Samarati, Pierangela (ed.) et al., Information security. 12th international conference, ISC 2009, Pisa, Italy, September 7–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04473-1/pbk). Lecture Notes in Computer Science 5735, 107-120 (2009).
MSC:  68P15 68P25
PDF BibTeX XML Cite
Full Text: DOI

A method for estimation of the success probability of an intrusion process by considering the temporal aspects of the attacker behavior. (English) Zbl 1239.68017

Gavrilova, Marina L. (ed.) et al., Transactions on Computational Science IV. Special issue on security in computing. Berlin: Springer (ISBN 978-3-642-01003-3/pbk). Lecture Notes in Computer Science 5430. Journal Subline, 200-214 (2009).
MSC:  68M20 68Q87
PDF BibTeX XML Cite
Full Text: DOI

Incremental hybrid intrusion detection using ensemble of weak classifiers. (English) Zbl 1183.68132

Sarbazi-Azad, Hamid (ed.) et al., Advances in computer science and engineering. 13th international CSI computer conference, CSICC 2008, Kish Island, Iran, March 9–11, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-89984-6/pbk; 978-3-540-89985-3/ebook). Communications in Computer and Information Science 6, 577-584 (2008).
MSC:  68M99
PDF BibTeX XML Cite
Full Text: DOI

How to protect yourself without perfect shredding. (English) Zbl 1155.68383

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 511-523 (2008).
MSC:  68P25 68M12 94A62
PDF BibTeX XML Cite
Full Text: DOI Link

Securing information and communications systems: principles, technologies and applications. (English) Zbl 1142.68031

Computer Security Series. Boston, MA: Artech House (ISBN 978-1-59693-228-9/hbk; 978-1-59693-229-6/ebook). xiv, 362 p. (2008).
PDF BibTeX XML Cite

The CoBFIT toolkit. (English) Zbl 1283.68101

Proceedings of the 26th annual ACM symposium on principles of distributed computing, PODC ’07, Portland, OR, USA, August 12–15, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-616-5). 350-351 (2007).
MSC:  68M14 68M15 68N99
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Year of Publication

all top 3

Classification

all top 3

Software