Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2008
- Humberto J. Abdelnur, Radu State, Olivier Festor:
Advanced Network Fingerprinting. RAID 2008: 372-389 - Magnus Almgren, Ulf Lindqvist, Erland Jonsson:
A Multi-Sensor Model to Improve Automated Attack Detection. RAID 2008: 291-310 - Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam:
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. RAID 2008: 351-371 - Sergey Bratus, Joshua Brody, David Kotz, Anna Shubina:
Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract). RAID 2008: 412-414 - Andrew Brown, Mark Ryan:
Monitoring the Execution of Third-Party Software on Mobile Devices. RAID 2008: 410-411 - Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim:
An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract). RAID 2008: 402-403 - Lorenzo Cavallaro, R. Sekar:
Anomalous Taint Detection. RAID 2008: 417-418 - Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe:
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. RAID 2008: 231-250 - Simon P. Chung, Aloysius K. Mok:
Swarm Attacks against Network-Level Emulation/Analysis. RAID 2008: 175-190 - M. Patrick Collins, Michael K. Reiter:
On the Limits of Payload-Oblivious Network Attack Detection. RAID 2008: 251-270 - Nathalie Dagorn:
WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract). RAID 2008: 392-393 - Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer:
Predicting the Resource Consumption of Network Intrusion Detection Systems. RAID 2008: 135-154 - Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Model-Based Covert Timing Channels: Automated Modeling and Evasion. RAID 2008: 211-230 - Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh:
A Study of the Packer Problem and Its Solutions. RAID 2008: 98-115 - Divya Jain, K. Vasanta Lakshmi, Priti Shankar:
Deep Packet Inspection Using Message Passing Networks. RAID 2008: 419-420 - Ashish Kamra, Elisa Bertino:
Database Intrusion Detection and Response. RAID 2008: 400-401 - Kevin S. Killourhy, Roy A. Maxion:
The Effect of Clock Resolution on Keystroke Dynamics. RAID 2008: 331-350 - Junsup Lee, Sung Deok Cha:
Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract). RAID 2008: 404-405 - Christina Lioma, Marie-Francine Moens, Juan-Carlos Gomez, Jan De Beer, André Bergholz, Gerhard Paass, Patrick Horkan:
Anticipating Hidden Text Salting in Emails. RAID 2008: 396-397 - Wei Lu, Ali A. Ghorbani:
Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract). RAID 2008: 415-416 - Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell:
A Layered Architecture for Detecting Malicious Behaviors. RAID 2008: 78-97 - Sean McAllister, Engin Kirda, Christopher Kruegel:
Leveraging User Interactions for In-Depth Testing of Web Applications. RAID 2008: 191-210 - Gaspar Modelo-Howard, Saurabh Bagchi, Guy Lebanon:
Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling. RAID 2008: 271-290 - Mohamed Nassar, Radu State, Olivier Festor:
Monitoring SIP Traffic Using Support Vector Machines. RAID 2008: 311-330 - Daniel Ramsbrock, Xinyuan Wang, Xuxian Jiang:
A First Step towards Live Botmaster Traceback. RAID 2008: 59-77 - Martin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda, Vojtech Krmicek:
Improving Anomaly Detection Error Rate by Collective Trust Modeling. RAID 2008: 398-399 - Ryan D. Riley, Xuxian Jiang, Dongyan Xu:
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. RAID 2008: 1-20 - Paul Rubel, Partha P. Pal, Michael Atighetchi, D. Paul Benjamin, Franklin Webber:
Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response. RAID 2008: 408-409 - Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar:
Evading Anomaly Detection through Variance Injection Attacks on PCA. RAID 2008: 394-395 - Nabil Schear, David R. Albrecht, Nikita Borisov:
High-Speed Matching of Vulnerability Signatures. RAID 2008: 155-174
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 03:47 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint