×

Found 229 Documents (Results 1–100)

Evading machine learning based network intrusion detection systems with GANs. (English) Zbl 07526411

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 335-356 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Continuous authentication security games. (English) Zbl 07526405

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 180-203 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

A cybersecurity framework for classifying non stationary data streams exploiting genetic programming and ensemble learning. (English) Zbl 07249934

Sergeyev, Yaroslav D. (ed.) et al., Numerical computations: theory and algorithms. Third international conference, NUMTA 2019, Crotone, Italy, June 15–21, 2019. Revised selected papers. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11973, 269-277 (2020).
MSC:  65-XX
PDF BibTeX XML Cite
Full Text: DOI

Dimensionality reduction and visualization of network intrusion detection data. (English) Zbl 1443.68040

Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 441-455 (2019).
MSC:  68M25 68M10 68T05
PDF BibTeX XML Cite
Full Text: DOI Link

Efficient adaptively secure public-key trace and revoke from subset cover using Déjà Q framework. (English) Zbl 07124894

Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11449, 468-489 (2018).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

A game theoretical model for optimal distribution of network security resources. (English) Zbl 1453.91009

Rass, Stefan (ed.) et al., Decision and game theory for security. 8th international conference, GameSec 2017, Vienna, Austria, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10575, 234-255 (2017).
MSC:  91A10 91A80 91B32
PDF BibTeX XML Cite
Full Text: DOI

Optimal thresholds for anomaly-based intrusion detection in dynamical environments. (English) Zbl 1453.91032

Zhu, Quanyan (ed.) et al., Decision and game theory for security. 7th international conference, GameSec 2016, New York, NY, USA, November 2–4, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9996, 415-434 (2016).
MSC:  91A43 91A80 68M25
PDF BibTeX XML Cite
Full Text: DOI arXiv

Improving intrusion detection systems for wireless sensor networks. (English) Zbl 1404.94115

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 343-360 (2014).
MSC:  94A60 68P25 68M12
PDF BibTeX XML Cite
Full Text: DOI

Detection of HTTP-GET attack with clustering and information theoretic measurements. (English) Zbl 1317.94098

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 5th international symposium, FPS 2012, Montreal, QC, Canada, October 25–26, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37118-9/pbk). Lecture Notes in Computer Science 7743, 45-61 (2013).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Indices of power in optimal IDS default configuration: theory and examples. (English) Zbl 1349.68018

Baras, John S. (ed.) et al., Decision and game theory for security. Second international conference, GameSec 2011, College Park, MD, Maryland, USA, November 14–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25279-2/pbk). Lecture Notes in Computer Science 7037, 7-21 (2011).
PDF BibTeX XML Cite
Full Text: DOI arXiv

Network statistics in function of statistical intrusion detection. (English) Zbl 1209.68014

Rudas, Imre J.(ed) et al., Computational intelligence and informatics. Selected papers based on the presentations at the 10th international symposium of Hungarian researchers on computational intelligence and informatics, Budapest, Hungary, November 12–14, 2009. Berlin: Springer (ISBN 978-3-642-15219-1/hbk; 978-3-642-15220-7/ebook). Studies in Computational Intelligence 313, 27-35 (2010).
MSC:  68M10 68M99
PDF BibTeX XML Cite
Full Text: DOI

A deviation based outlier intrusion detection system. (English) Zbl 1207.68061

Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 395-401 (2010).
MSC:  68M10 68T05 68M11
PDF BibTeX XML Cite
Full Text: DOI

Detection and classification of DDoS attacks using fuzzy inference system. (English) Zbl 1210.68021

Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 242-252 (2010).
MSC:  68M10
PDF BibTeX XML Cite
Full Text: DOI

Fuzzy rule-base based intrusion detection system on application layer. (English) Zbl 1210.68020

Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 27-36 (2010).
MSC:  68M10
PDF BibTeX XML Cite
Full Text: DOI

Novelty-aware attack recognition - intrusion detection with organic computing techniques. (English) Zbl 1202.68081

Hinchey, Mike (ed.) et al., Distributed, parallel and biologically inspired systems. 7th IFIP TC 10 working conference, DIPES 2010, and 3rd IFIP TC 10 international conference biologically-inspired collaborative computing, BICC 2010, held as part of WCC 2010, Brisbane, Australia, September 20–23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15233-7/hbk; 978-3-642-15234-4/ebook). IFIP Advances in Information and Communication Technology 329, 242-253 (2010).
MSC:  68M99 68M14
PDF BibTeX XML Cite
Full Text: DOI

Intrusion detections in collaborative organizations by preserving privacy. (English) Zbl 1198.68086

Guillet, F. (ed.) et al., Advances in knowledge discovery and management. Selected papers based on the presentations at the “Extraction et gestion des connaissances” conference 2009 (EGC), Strasbourg, France, January 2009. Berlin: Springer (ISBN 978-3-642-00579-4/hbk). Studies in Computational Intelligence 292, 235-247 (2010).
MSC:  68M10
PDF BibTeX XML Cite
Full Text: DOI

Mining common outliers for intrusion detection. (English) Zbl 1202.68122

Guillet, F. (ed.) et al., Advances in knowledge discovery and management. Selected papers based on the presentations at the “Extraction et gestion des connaissances” conference 2009 (EGC), Strasbourg, France, January 2009. Berlin: Springer (ISBN 978-3-642-00579-4/hbk). Studies in Computational Intelligence 292, 217-234 (2010).
MSC:  68P05 68M99 68T10
PDF BibTeX XML Cite
Full Text: DOI

Neural network and artificial immune systems for malware and network intrusion detection. (English) Zbl 1185.68526

Koronacki, Jacek (ed.) et al., Advances in machine learning II. Dedicated to the memory of Professor Ryszard S. Michalski. Berlin: Springer (ISBN 978-3-642-05178-4/hbk; 978-3-642-05179-1/ebook). Studies in Computational Intelligence 263, 485-513 (2010).
MSC:  68T05 68N99
PDF BibTeX XML Cite
Full Text: DOI

Tree-structure based hybrid computational intelligence. Theoretical foundations and applications. (English) Zbl 1195.68076

Intelligent Systems Reference Library 2. Berlin: Springer (ISBN 978-3-642-04738-1/hbk; 978-3-642-26120-6/pbk; 978-3-642-04739-8/ebook). xiv, 206 p. (2010).
PDF BibTeX XML Cite
Full Text: DOI

Behavioural biometrics hardware based on bioinformatics matching. (English) Zbl 1191.68119

Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 171-178 (2009).
MSC:  68M99
PDF BibTeX XML Cite
Full Text: DOI

Multiagent systems for network intrusion detection: A review. (English) Zbl 1191.68727

Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 143-154 (2009).
MSC:  68T42 68M10
PDF BibTeX XML Cite
Full Text: DOI

Learning program behavior for run-time software assurance. (English) Zbl 1191.68483

Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 135-142 (2009).
MSC:  68T05 68N99
PDF BibTeX XML Cite
Full Text: DOI

Detection of database intrusion using a two-stage fuzzy system. (English) Zbl 1343.68070

Samarati, Pierangela (ed.) et al., Information security. 12th international conference, ISC 2009, Pisa, Italy, September 7–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04473-1/pbk). Lecture Notes in Computer Science 5735, 107-120 (2009).
MSC:  68P15 68P25
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software