-
1
-
-
0242676079
-
Visual exploration process for the analysis of internet routing data
-
IEEE Computer Society: Washington, DC
-
Teoh ST, Ma KL, Wu SF. Visual exploration process for the analysis of internet routing data. In Proceedings of the IEEE Conference on Visualization 2003. IEEE Computer Society: Washington, DC, 2003; 523-530.
-
(2003)
Proceedings of the IEEE Conference on Visualization 2003
, pp. 523-530
-
-
Teoh, S.T.1
Ma, K.L.2
Wu, S.F.3
-
2
-
-
4644354461
-
Visual data analysis for detecting flaws and intruders in computer network systems
-
Teoh ST, Jankun-Kelly T, Ma K-L, Wu SF. Visual data analysis for detecting flaws and intruders in computer network systems. IEEE Computer Graphics and Applications 2004; 24(5): 27-35.
-
(2004)
IEEE Computer Graphics and Applications
, vol.24
, Issue.5
, pp. 27-35
-
-
Teoh, S.T.1
Jankun-Kelly, T.2
Ma, K.-L.3
Wu, S.F.4
-
3
-
-
84863383376
-
Forensic Data Visualization System: Improving Security Through Automation
-
Myrtle Beach, South Carolina, April 12-13
-
Francia G, Trifas M, Brown D, Francia R, Scott C. Forensic Data Visualization System: Improving Security Through Automation. Computer Security Conference, Myrtle Beach, South Carolina, April 12-13, 2007.
-
(2007)
Computer Security Conference
-
-
Francia, G.1
Trifas, M.2
Brown, D.3
Francia, R.4
Scott, C.5
-
4
-
-
70350068836
-
Retrieving knowledge from auditing log files for computer and network forensics and accountability
-
Takahashi D, Xiao Y. Retrieving knowledge from auditing log files for computer and network forensics and accountability. Security and Communication Networks 2008; 1(2): 147-160.
-
(2008)
Security and Communication Networks
, vol.1
, Issue.2
, pp. 147-160
-
-
Takahashi, D.1
Xiao, Y.2
-
5
-
-
42649088128
-
Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
-
Special Issue on Security in Mobile Ad Hoc and Sensor Networks
-
Xiao Y. Accountability for wireless LANs, ad hoc networks, and wireless mesh networks. IEEE Communications Magazine, Special Issue on Security in Mobile Ad Hoc and Sensor Networks 2008; 46(4): 116-126.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 116-126
-
-
Xiao, Y.1
-
6
-
-
74849122349
-
Building a wireless capturing tool for WiFi
-
DOI: 10.1002/sec.107
-
Meng K, Xiao Y, Vrbsky SV. Building a wireless capturing tool for WiFi. Security and Communication Networks 2009; 2(6): 654-668. DOI: 10.1002/sec.107
-
(2009)
Security and Communication Networks
, vol.2
, Issue.6
, pp. 654-668
-
-
Meng, K.1
Xiao, Y.2
Vrbsky, S.V.3
-
7
-
-
70350060199
-
Flow-net methodology for accountability in wireless networks
-
Xiao Y. Flow-net methodology for accountability in wireless networks. IEEE Network 2009; 23(5): 30-37.
-
(2009)
IEEE Network
, vol.23
, Issue.5
, pp. 30-37
-
-
Xiao, Y.1
-
10
-
-
78650637965
-
An FPGA-based system for tracking digital information transmitted via peer-to-peer protocols
-
Schrader KR, Mullins BE, Peterson GL, Mills RF. An FPGA-based system for tracking digital information transmitted via peer-to-peer protocols. International Journal of Security and Networks 2010; 5(4): 236-247.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 236-247
-
-
Schrader, K.R.1
Mullins, B.E.2
Peterson, G.L.3
Mills, R.F.4
-
13
-
-
77949732329
-
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
-
Guo H, Mu Y, Zhang XY, Li ZJ. Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security. International Journal of Security and Networks 2010; 5(2/3): 173-187.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 173-187
-
-
Guo, H.1
Mu, Y.2
Zhang, X.Y.3
Li, Z.J.4
-
15
-
-
77949729303
-
Experimental analysis of application-level intrusion detection algorithms
-
Dong Y, Hsu S, Rajput S, Wu B. Experimental analysis of application-level intrusion detection algorithms. International Journal of Security and Networks 2010; 5(2/3): 198-205.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 198-205
-
-
Dong, Y.1
Hsu, S.2
Rajput, S.3
Wu, B.4
-
17
-
-
77949760270
-
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
-
Leng X, Lien Y, Mayes K, Markantonakis K. An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing. International Journal of Security and Networks 2010; 5(2/3): 79-86.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 79-86
-
-
Leng, X.1
Lien, Y.2
Mayes, K.3
Markantonakis, K.4
-
18
-
-
77949692385
-
Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees
-
Dalton II GC, Edge KS, Mills RF, Raines RA. Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees. International Journal of Security and Networks 2010; 5(2/3): 87-95.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 87-95
-
-
Dalton II, G.C.1
Edge, K.S.2
Mills, R.F.3
Raines, R.A.4
-
22
-
-
77949694146
-
Security and privacy on low-cost radio frequency identification systems
-
Sun L. Security and privacy on low-cost radio frequency identification systems. International Journal of Security and Networks 2010; 5(2/3): 128-134.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 128-134
-
-
Sun, L.1
-
25
-
-
77949750049
-
A ubiquitous mobile telemedicine system for the elderly using RFID
-
Raad M. A ubiquitous mobile telemedicine system for the elderly using RFID. International Journal of Security and Networks 2010; 5(2/3): 156-164.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 156-164
-
-
Raad, M.1
-
26
-
-
77949666177
-
Perceived barriers to the widespread commercial use of radio frequency identification technology
-
Rodrigues MJ, James K. Perceived barriers to the widespread commercial use of radio frequency identification technology. International Journal of Security and Networks 2010; 5(2/3): 165-172.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 165-172
-
-
Rodrigues, M.J.1
James, K.2
-
29
-
-
77949801623
-
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
-
Huang S, Shieh S. Authentication and secret search mechanisms for RFID-aware wireless sensor networks. International Journal of Security and Networks 2010; 5(1): 15-25.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 15-25
-
-
Huang, S.1
Shieh, S.2
-
30
-
-
77949844099
-
An efficient secure data dissemination scheme for grid structure wireless sensor networks
-
Hsiao Y, Hwang R. An efficient secure data dissemination scheme for grid structure wireless sensor networks. International Journal of Security and Networks 2010; 5(1): 26-34.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 26-34
-
-
Hsiao, Y.1
Hwang, R.2
-
31
-
-
77949835881
-
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
-
Xu L, Chen S, Huang X, Mu Y. Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks. International Journal of Security and Networks 2010; 5(1): 35-44.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 35-44
-
-
Xu, L.1
Chen, S.2
Huang, X.3
Mu, Y.4
-
32
-
-
77949817850
-
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
-
Tsai K, Hsu C, Wu T. Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks. International Journal of Security and Networks 2010; 5(1): 45-52.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 45-52
-
-
Tsai, K.1
Hsu, C.2
Wu, T.3
-
33
-
-
77949864345
-
Lightweight authentication protocol for mobile RFID networks
-
Yang M. Lightweight authentication protocol for mobile RFID networks. International Journal of Security and Networks 2010; 5(1): 53-62.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 53-62
-
-
Yang, M.1
-
34
-
-
77949830969
-
A cross-layer authentication design for secure video transportation in wireless sensor network
-
Wang J, Smith GL. A cross-layer authentication design for secure video transportation in wireless sensor network. International Journal of Security and Networks 2010; 5(1): 63-76.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 63-76
-
-
Wang, J.1
Smith, G.L.2
-
35
-
-
70349969846
-
A proactive secret sharing scheme in matrix projection method
-
Bai L, Zou X. A proactive secret sharing scheme in matrix projection method. International Journal of Security and Networks 2009; 4(4): 201-209.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 201-209
-
-
Bai, L.1
Zou, X.2
-
37
-
-
70349968221
-
Handling inheritance violation for secure interoperation of heterogeneous systems
-
Huang H, Kirchner H, Liu S, Wu W. Handling inheritance violation for secure interoperation of heterogeneous systems. International Journal of Security and Networks 2009; 4(4): 223-233.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 223-233
-
-
Huang, H.1
Kirchner, H.2
Liu, S.3
Wu, W.4
-
38
-
-
70349949111
-
Visibility: a novel concept for characterising provable network digital evidences
-
Rekhis S, Boudriga NA. Visibility: a novel concept for characterising provable network digital evidences. International Journal of Security and Networks 2009; 4(4): 234-245.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 234-245
-
-
Rekhis, S.1
Boudriga, N.A.2
-
42
-
-
68149158275
-
An efficient one-time password authentication scheme using a smart card
-
Lee S, Sivalingam KM. An efficient one-time password authentication scheme using a smart card. International Journal of Security and Networks 2009; 4(3): 145-152.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 145-152
-
-
Lee, S.1
Sivalingam, K.M.2
-
46
-
-
68149180871
-
Intrusion detection system for denial-of-service flooding attacks in SIP communication networks
-
Ehlert S, Rebahi Y, Magedanz T. Intrusion detection system for denial-of-service flooding attacks in SIP communication networks. International Journal of Security and Networks 2009; 4(3): 189-200.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 189-200
-
-
Ehlert, S.1
Rebahi, Y.2
Magedanz, T.3
-
47
-
-
61849085156
-
An evaluation of connection characteristics for separating network attacks
-
Berthier R, Cukier M. An evaluation of connection characteristics for separating network attacks. International Journal of Security and Networks 2009; 4(1/2): 110-124.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 110-124
-
-
Berthier, R.1
Cukier, M.2
-
48
-
-
61849158146
-
An efficient group key management scheme for mobile ad hoc networks
-
Wu B, Wu J, Dong Y. An efficient group key management scheme for mobile ad hoc networks. International Journal of Security and Networks 2009; 4(1/2): 125-134.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 125-134
-
-
Wu, B.1
Wu, J.2
Dong, Y.3
-
50
-
-
61849163799
-
Proximity-based authentication of mobile devices
-
Scannell A, Varshavsky A, LaMarca A, De Lara E. Proximity-based authentication of mobile devices. International Journal of Security and Networks 2009; 4(1/2): 4-16.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 4-16
-
-
Scannell, A.1
Varshavsky, A.2
LaMarca, A.3
De Lara, E.4
-
52
-
-
61849134762
-
Secure pairing with biometrics
-
Buhan I, Boom B, Doumen J, Hartel, Veldhuis RNJ. Secure pairing with biometrics. International Journal of Security and Networks 2009; 4(1/2): 27-42.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 27-42
-
-
Buhan, I.1
Boom, B.2
Doumen, J.3
Hartel4
Veldhuis, R.N.J.5
-
54
-
-
61849184822
-
Using audio in secure device pairing
-
Goodrich MT, Sirivianos M, Solis J, Soriente C, Tsudik G, Uzun E. Using audio in secure device pairing. International Journal of Security and Networks 2009; 4(1/2): 57-68.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 57-68
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Soriente, C.4
Tsudik, G.5
Uzun, E.6
-
57
-
-
61849158147
-
Designing user studies for security applications: a case study with wireless network configuration
-
Kuo C, Perrig A, Walker J. Designing user studies for security applications: a case study with wireless network configuration. International Journal of Security and Networks 2009; 409(1/2): 101-109.
-
(2009)
International Journal of Security and Networks
, vol.409
, Issue.1-2
, pp. 101-109
-
-
Kuo, C.1
Perrig, A.2
Walker, J.3
-
58
-
-
79551645150
-
An one-way function based framework for pairwise key establishment in sensor networks
-
Ma L, Teymorian AY, Xing K, Du D. An one-way function based framework for pairwise key establishment in sensor networks. International Journal of Security and Networks 2008; 3(4): 217-225.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 217-225
-
-
Ma, L.1
Teymorian, A.Y.2
Xing, K.3
Du, D.4
-
59
-
-
79551628267
-
Clique-based group key assignment in wireless sensor networks
-
Srinivasan A, Li F, Wu J, Li M. Clique-based group key assignment in wireless sensor networks. International Journal of Security and Networks 2008; 3(4): 226-239.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 226-239
-
-
Srinivasan, A.1
Li, F.2
Wu, J.3
Li, M.4
-
60
-
-
77953193668
-
NTP-DownloadT: a conformance test tool for secured mobile download services
-
Hsieh C, Chen J, Lin Y-B, et al. NTP-DownloadT: a conformance test tool for secured mobile download services. International Journal of Security and Networks 2008; 3(4): 240-249.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 240-249
-
-
Hsieh, C.1
Chen, J.2
Lin, Y.-B.3
-
62
-
-
79551651366
-
Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
-
Kandikattu R, Jacob L. Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks. International Journal of Security and Networks 2008; 3(4): 258-274.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 258-274
-
-
Kandikattu, R.1
Jacob, L.2
-
64
-
-
79951637895
-
Firewall filtering rules analysis for anomalies detection
-
Bouhoula A, Trabelsi Z, Barka E, Benelbahri M. Firewall filtering rules analysis for anomalies detection. International Journal of Security and Networks 2008; 3(3): 161-172.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 161-172
-
-
Bouhoula, A.1
Trabelsi, Z.2
Barka, E.3
Benelbahri, M.4
-
65
-
-
77954327354
-
PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks
-
Li F, Srinivasan A, Wu J. PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks. International Journal of Security and Networks 2008: 3(3): 173-182.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 173-182
-
-
Li, F.1
Srinivasan, A.2
Wu, J.3
-
67
-
-
72549101766
-
An agent-based framework for intrusion detection alert verification and event correlation
-
Uphoff B, Wong JS. An agent-based framework for intrusion detection alert verification and event correlation. International Journal of Security and Networks 2008; 3(3): 193-200.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 193-200
-
-
Uphoff, B.1
Wong, J.S.2
-
68
-
-
79951661564
-
Secure user-identification and key distribution scheme preserving anonymity
-
Tripathy S, Nandi S. Secure user-identification and key distribution scheme preserving anonymity. International Journal of Security and Networks 2008; 3(3): 201-205.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 201-205
-
-
Tripathy, S.1
Nandi, S.2
-
69
-
-
77952481544
-
ID-based threshold proxy signcryption scheme from bilinear pairings
-
Li F, Xin X, Hu Y. ID-based threshold proxy signcryption scheme from bilinear pairings. International Journal of Security and Networks 2008; 3(3): 206-215.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 206-215
-
-
Li, F.1
Xin, X.2
Hu, Y.3
-
70
-
-
51849141536
-
A novel localised authentication scheme in IEEE 802.11 based wireless mesh networks
-
Lin X, Ling X, Zhu H, Ho P, Shen X. A novel localised authentication scheme in IEEE 802.11 based wireless mesh networks. International Journal of Security and Networks 2008; 3(2): 122-132.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 122-132
-
-
Lin, X.1
Ling, X.2
Zhu, H.3
Ho, P.4
Shen, X.5
-
71
-
-
77953145198
-
Adaptive clustering for scalable key management in dynamic group communications
-
Challal Y, Gharout S, Bouabdallah A, Bettahar H. Adaptive clustering for scalable key management in dynamic group communications. International Journal of Security and Networks 2008; 3(2): 133-146.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 133-146
-
-
Challal, Y.1
Gharout, S.2
Bouabdallah, A.3
Bettahar, H.4
-
73
-
-
77955714466
-
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
-
Ray I, Poolsappasit N. Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. International Journal of Security and Networks 2008; 3(2): 80-94.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 80-94
-
-
Ray, I.1
Poolsappasit, N.2
-
74
-
-
70149104596
-
Forensic analysis of SCADA systems and networks
-
Kilpatrick T, Gonzalez J, Chandia R, Papa M, Shenoi S. Forensic analysis of SCADA systems and networks. International Journal of Security and Networks 2008; 3(2): 95-102.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 95-102
-
-
Kilpatrick, T.1
Gonzalez, J.2
Chandia, R.3
Papa, M.4
Shenoi, S.5
-
78
-
-
84863373862
-
-
Encyclopedia Britannica: Definition of Data Mining.
-
Clifton C. Encyclopedia Britannica: Definition of Data Mining., 2010.
-
(2010)
-
-
Clifton, C.1
-
79
-
-
0242339692
-
Visual-based anomaly detection for BGP origin as change (OASC) events
-
Springer: Heidelberg, Germany, Oct
-
Teoh ST, Ma K, Wu SF, et al. Visual-based anomaly detection for BGP origin as change (OASC) events. In Proceedings of the Distributed Systems, Operations, and Management Workshop (DSOM'03). Springer: Heidelberg, Germany, Oct 2003; 155-168.
-
(2003)
Proceedings of the Distributed Systems, Operations, and Management Workshop (DSOM'03)
, pp. 155-168
-
-
Teoh, S.T.1
Ma, K.2
Wu, S.F.3
-
80
-
-
0002283033
-
From data mining to knowledge discovery in databases
-
Fayyad U, Piatetsky-Shapiro G, Smyth P. From data mining to knowledge discovery in databases. AI Magazine 1996; 17(3): 37-54.
-
(1996)
AI Magazine
, vol.17
, Issue.3
, pp. 37-54
-
-
Fayyad, U.1
Piatetsky-Shapiro, G.2
Smyth, P.3
-
81
-
-
0003280548
-
Mining Databases: Towards Algorithms for Knowledge Discovery
-
Fayyad UM. Mining Databases: Towards Algorithms for Knowledge Discovery. Data Engineering Bulletin 1998; 21(1): 39-48.
-
(1998)
Data Engineering Bulletin
, vol.21
, Issue.1
, pp. 39-48
-
-
Fayyad, U.M.1
-
82
-
-
0002433547
-
From data mining to knowledge discovery: an overview
-
Fayyad UM, eds.) AAAI Press and MIT Press: Menlo Park, CA/Cambridge, MA
-
Fayyad UM, Piatetsky-Shapiro G, Smith P. From data mining to knowledge discovery: an overview. In Advances in Knowledge Discovery and Data Mining, Fayyad UM et al., (eds.) AAAI Press and MIT Press: Menlo Park, CA/Cambridge, MA, 1996; 1-34.
-
(1996)
Advances in Knowledge Discovery and Data Mining
, pp. 1-34
-
-
Fayyad, U.M.1
Piatetsky-Shapiro, G.2
Smith, P.3
-
83
-
-
0034838197
-
-
Data mining methods for detection of new malicious executables. In Proceedings of the IEEE Symposium on Security and Privacy
-
Schultz MG, Eskin E, Zadok E, Stolfo SJ. Data mining methods for detection of new malicious executables. In Proceedings of the IEEE Symposium on Security and Privacy, 2001.
-
(2001)
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
84
-
-
85084160308
-
A study in using neural networks for anomaly and misuse detection
-
Proceedings of the Eighth USENIX Security Symposium
-
Ghosh AK, Schwartzbard A. A study in using neural networks for anomaly and misuse detection. In Proceedings of the Eighth USENIX Security Symposium, 1999.
-
(1999)
-
-
Ghosh, A.K.1
Schwartzbard, A.2
-
85
-
-
44049102761
-
Considering both intra-pattern and inter-pattern anomalies for intrusion detection
-
Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM'02)
-
Jiang N, Hua K, Sheu S. Considering both intra-pattern and inter-pattern anomalies for intrusion detection, In Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM'02), 2002.
-
(2002)
-
-
Jiang, N.1
Hua, K.2
Sheu, S.3
-
86
-
-
23544449776
-
Learning models of network traffic for detecting novel attacks
-
Proceedings of the Third IEEE International Conference on Data Mining (ICDM'03)
-
Mahoney MV, Chan PK. Learning models of network traffic for detecting novel attacks. In Proceedings of the Third IEEE International Conference on Data Mining (ICDM'03), 2003.
-
(2003)
-
-
Mahoney, M.V.1
Chan, P.K.2
-
87
-
-
84942248748
-
Finding the vocabulary of program behavior data for anomaly detection
-
Proceedings DISCEX '03
-
Michael CC. Finding the vocabulary of program behavior data for anomaly detection. In Proceedings DISCEX '03, 2003.
-
(2003)
-
-
Michael, C.C.1
-
88
-
-
33746368048
-
Enhancing security using mobility-based anomaly detection in cellular mobile networks
-
Sun B, Yu F, Wu K, Xiao Y, Leung VCM. Enhancing security using mobility-based anomaly detection in cellular mobile networks. IEEE Transactions on Vehicular Technology 2006; 55(4):1385-1396.
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.4
, pp. 1385-1396
-
-
Sun, B.1
Yu, F.2
Wu, K.3
Xiao, Y.4
Leung, V.C.M.5
-
89
-
-
34250761381
-
Integration of mobility and intrusion detection for wireless ad hoc networks
-
Sun B, Wu K, Xiao Y, Wang R. Integration of mobility and intrusion detection for wireless ad hoc networks. International Journal of Communication Systems 2007; 20(6): 695-721.
-
(2007)
International Journal of Communication Systems
, vol.20
, Issue.6
, pp. 695-721
-
-
Sun, B.1
Wu, K.2
Xiao, Y.3
Wang, R.4
-
93
-
-
84863373864
-
A prototype tool for visual data mining of network traffic for intrusion detection
-
Proceedings of the ICDM Workshop on Data Mining for Computer Security (DMSEC'03)
-
Yurcik W, Lakkaraju K, Barlow J, Rosendale J. A prototype tool for visual data mining of network traffic for intrusion detection. In Proceedings of the ICDM Workshop on Data Mining for Computer Security (DMSEC'03), 2003.
-
(2003)
-
-
Yurcik, W.1
Lakkaraju, K.2
Barlow, J.3
Rosendale, J.4
-
95
-
-
84948658749
-
Tudumi: information visualization system for monitoring and auditing computer logs
-
Proceedings of the Sixth International Conference on Information Visualization
-
Takada T, Koike H. Tudumi: information visualization system for monitoring and auditing computer logs. In Proceedings of the Sixth International Conference on Information Visualization, 2002.
-
(2002)
-
-
Takada, T.1
Koike, H.2
-
96
-
-
0034592922
-
Towards an effective cooperation of the user and the computer for classification
-
Proceedings of the Sixth International Conference on Knowledge Discovery and Data Mining (KDD '00)
-
Ankerst M, Ester M, Kriegel H-P. Towards an effective cooperation of the user and the computer for classification. In Proceedings of the Sixth International Conference on Knowledge Discovery and Data Mining (KDD '00), 2000.
-
(2000)
-
-
Ankerst, M.1
Ester, M.2
Kriegel, H.-P.3
-
97
-
-
85047342259
-
MineSet: An Integrated System for Data Access, Visual Data Mining, and Analytical Data Mining
-
Newport Beach, CA, August
-
Brunk C, Kelly J, Kohavi R. MineSet: An Integrated System for Data Access, Visual Data Mining, and Analytical Data Mining. In Proceedings of the Third Conference on Knowledge Discovery and Data Mining (KDD-97), Newport Beach, CA, August 1997; 135-138.
-
(1997)
Proceedings of the Third Conference on Knowledge Discovery and Data Mining (KDD-97)
, pp. 135-138
-
-
Brunk, C.1
Kelly, J.2
Kohavi, R.3
-
98
-
-
85094574423
-
Mielog: a highly interactive visual log browser using information visualization and statistical analysis
-
The USENIX Association: Berkeley, CA
-
Takada T, Koike H. Mielog: a highly interactive visual log browser using information visualization and statistical analysis. In Proceedings of LISA XVI Sixteenth Systems Administration Conference. The USENIX Association: Berkeley, CA, 2002; 133-144.
-
(2002)
Proceedings of LISA XVI Sixteenth Systems Administration Conference
, pp. 133-144
-
-
Takada, T.1
Koike, H.2
-
100
-
-
0032121774
-
Exploring large graphs in 3D hyperbolic space
-
Munzner T. Exploring large graphs in 3D hyperbolic space. IEEE Computer Graphics and Applications 1998; 18(4): 18-23.
-
(1998)
IEEE Computer Graphics and Applications
, vol.18
, Issue.4
, pp. 18-23
-
-
Munzner, T.1
-
101
-
-
0030405302
-
Visualizing the global topology of the MBone
-
IEEE Computer Society: Washington, DC
-
Munzner T, Hoffman E, Claffy K, Fenner B. Visualizing the global topology of the MBone. In Proceedings of the 1996 IEEE Symposium on Information Visualization. IEEE Computer Society: Washington, DC, 1996; 85-92.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Information Visualization
, pp. 85-92
-
-
Munzner, T.1
Hoffman, E.2
Claffy, K.3
Fenner, B.4
-
104
-
-
84947618408
-
-
Geolocations. Available from:
-
Geolocations. Available from:
-
-
-
-
105
-
-
33645222472
-
Hierarchical visualization of network intrusion detection data
-
Itoh T, Takakura H, Sawada A, Koyamada K. Hierarchical visualization of network intrusion detection data, IEEE Computer Graphics and Applications 2006; 26(2): 40-47.
-
(2006)
IEEE Computer Graphics and Applications
, vol.26
, Issue.2
, pp. 40-47
-
-
Itoh, T.1
Takakura, H.2
Sawada, A.3
Koyamada, K.4
-
106
-
-
33745202013
-
Improving the computer forensic analysis process through visualization
-
Teelink S, Erbacher RT. Improving the computer forensic analysis process through visualization. Communications of the ACM 2006; 49: 71-75.
-
(2006)
Communications of the ACM
, vol.49
, pp. 71-75
-
-
Teelink, S.1
Erbacher, R.T.2
-
107
-
-
57849138973
-
A survey on visualization for wireless security
-
Jeong CY, Chang BH, Na JC. A survey on visualization for wireless security. In Proceedings of the Fourth International Conference on Networked Computing and Advanced Information Management, NCM '08, Vol. 1, 2008; 129-132.
-
(2008)
Proceedings of the Fourth International Conference on Networked Computing and Advanced Information Management, NCM '08
, vol.1
, pp. 129-132
-
-
Jeong, C.Y.1
Chang, B.H.2
Na, J.C.3
-
109
-
-
84947614660
-
-
Available from:
-
Available from:
-
-
-
-
110
-
-
4644354461
-
Visual data analysis for detecting flaws and intruders in computer network systems
-
Teoh ST, Jankun-Kelly T, Ma K-L, Wu SF. Visual data analysis for detecting flaws and intruders in computer network systems. IEEE Computer Graphics and Applications, 2004; 24(5): 27-35.
-
(2004)
IEEE Computer Graphics and Applications
, vol.24
, Issue.5
, pp. 27-35
-
-
Teoh, S.T.1
Jankun-Kelly, T.2
Ma, K.-L.3
Wu, S.F.4
-
111
-
-
70350708245
-
Interactive visualization for network and port scan detection
-
Proceedings of Visualization for Computer Security, October .
-
Muelder C, Ma K, Bartoletti T. Interactive visualization for network and port scan detection. In Proceedings of Visualization for Computer Security, October 2006.
-
(2006)
-
-
Muelder, C.1
Ma, K.2
Bartoletti, T.3
-
112
-
-
33745202013
-
Improving the computer forensic analysis process through visualization
-
Teerlink S, Erbacher RF. Improving the computer forensic analysis process through visualization. Communications of the ACM 2006; 49(2): 71-75.
-
(2006)
Communications of the ACM
, vol.49
, Issue.2
, pp. 71-75
-
-
Teerlink, S.1
Erbacher, R.F.2
-
114
-
-
20444495766
-
-
PortVis: a tool for port-based detection of security events. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop Visualization and Data Mining for Computer Security
-
McPherson J, Ma K-L, Krystosk P, Bartoletti T, Christensen M. PortVis: a tool for port-based detection of security events. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop Visualization and Data Mining for Computer Security, 2004.
-
(2004)
-
-
McPherson, J.1
Ma, K.-L.2
Krystosk, P.3
Bartoletti, T.4
Christensen, M.5
-
115
-
-
39749136667
-
Support for computer forensics examination planning with domain modeling: a report of one experiment trial
-
Proceedings of the 40th Hawaii International Conference on Systems Sciences, January
-
Bogen A, Dampier D, Carver J. Support for computer forensics examination planning with domain modeling: a report of one experiment trial. In Proceedings of the 40th Hawaii International Conference on Systems Sciences, January 2007; pp. 267b.
-
(2007)
-
-
Bogen, A.1
Dampier, D.2
Carver, J.3
-
117
-
-
0025568642
-
Parallel coordinates: a tool for visualizing multi-dimensional geometry
-
Los Alamitos, CA. IEEE Computer Society Press: Washington, DC
-
Inselberg A, Dimsdale B. Parallel coordinates: a tool for visualizing multi-dimensional geometry. In VIS '90: Proceedings of the First Conference on Visualization '90, Los Alamitos, CA. IEEE Computer Society Press: Washington, DC, 1990; 361-378.
-
(1990)
VIS '90: Proceedings of the First Conference on Visualization '90
, pp. 361-378
-
-
Inselberg, A.1
Dimsdale, B.2
-
119
-
-
33749522392
-
Visual Firewall: real-time network security monitor
-
IEEE Computer Society Press: Washington, DC
-
Lee CP, Trost J, Gibbs N, Raheem B, Copeland JA. Visual Firewall: real-time network security monitor. In IEEE Workshop on Visualization for Computer Security. IEEE Computer Society Press: Washington, DC, 2005; 129-136.
-
(2005)
IEEE Workshop on Visualization for Computer Security
, pp. 129-136
-
-
Lee, C.P.1
Trost, J.2
Gibbs, N.3
Raheem, B.4
Copeland, J.A.5
-
121
-
-
84947617897
-
-
Available from:
-
Available from:
-
-
-
-
124
-
-
84947617488
-
-
Available from:
-
Available from:
-
-
-
-
125
-
-
84947618613
-
-
Available from:
-
Available from:
-
-
-
-
127
-
-
55349125312
-
Vertical and horizontal synchronization services with outlier detection in underwater sensor networks
-
Hu F, Malkawi Y, Kumar S, Xiao Y. Vertical and horizontal synchronization services with outlier detection in underwater sensor networks. Wireless Communications and Mobile 2008; 8(9): 1165-1181.
-
(2008)
Wireless Communications and Mobile
, vol.8
, Issue.9
, pp. 1165-1181
-
-
Hu, F.1
Malkawi, Y.2
Kumar, S.3
Xiao, Y.4
-
128
-
-
0036448607
-
-
Case study: interactive visualization for internet security. In 13th IEEE Visualization 2002 (VIS 2002)
-
Teoh ST, Ma KL, Wu SF, Zhao X. Case study: interactive visualization for internet security. In 13th IEEE Visualization 2002 (VIS 2002), 2002.
-
(2002)
-
-
Teoh, S.T.1
Ma, K.L.2
Wu, S.F.3
Zhao, X.4
-
129
-
-
84863373875
-
Detecting intruders in computer systems
-
Proceedings of the 1993 Conference on Auditing and Computer Technology
-
Teoh ST, Zhang K, Tseng S, Ma KL, Wu SF, Lunt T. Detecting intruders in computer systems. In Proceedings of the 1993 Conference on Auditing and Computer Technology, 1993.
-
(1993)
-
-
Teoh, S.T.1
Zhang, K.2
Tseng, S.3
Ma, K.L.4
Wu, S.F.5
Lunt, T.6
-
130
-
-
19444386335
-
Detecting intruders in computer systems
-
Proceedings of the 1993 Conference on Auditing and Computer Technology
-
Lunt T. Detecting intruders in computer systems. In Proceedings of the 1993 Conference on Auditing and Computer Technology, 1993.
-
(1993)
-
-
Lunt, T.1
-
131
-
-
84863375589
-
-
A border gateway protocol 4 (bgp-4). RFC 1771
-
Rekhter Y, Li T. A border gateway protocol 4 (bgp-4). RFC 1771, 1995.
-
(1995)
-
-
Rekhter, Y.1
Li, T.2
-
132
-
-
84947617285
-
-
Note
-
Inappropriate Content Visualization.
-
-
-
-
133
-
-
85094313960
-
Bridging the host-network divide: survey, taxonomy, and solution
-
Washington, DC. USENIX Association: Berkeley, CA
-
Fink GA, Duggirala V, Correa R, North C.Bridging the host-network divide: survey, taxonomy, and solution. In Proceedings of LISA '06, Washington, DC. USENIX Association: Berkeley, CA, 2006; 247-262.
-
(2006)
Proceedings of LISA '06
, pp. 247-262
-
-
Fink, G.A.1
Duggirala, V.2
Correa, R.3
North, C.4
-
134
-
-
84863375587
-
CluVis dual-domain visual exploration of cluster network metadata
-
Proceedings of the 45th Annual Southeast Regional Conference, ACMSE '07
-
Teoh ST, Ma KL, Wu SF, Zhao X. CluVis dual-domain visual exploration of cluster network metadata. In Proceedings of the 45th Annual Southeast Regional Conference, ACMSE '07, 2007.
-
(2007)
-
-
Teoh, S.T.1
Ma, K.L.2
Wu, S.F.3
Zhao, X.4
-
136
-
-
33749513452
-
A visualization methodology for characterization of network scans
-
Proceedings of the IEEE Workshop Visualization for Computer Security (VizSEC), Oct. .
-
Muelder C, Ma K-L, Bartoletti T. A visualization methodology for characterization of network scans. In Proceedings of the IEEE Workshop Visualization for Computer Security (VizSEC), Oct. 2005.
-
(2005)
-
-
Muelder, C.1
Ma, K.-L.2
Bartoletti, T.3
-
137
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
Proceedings of the IEEE Symposium on Security and Privacy
-
Lee W, Stolfo SJ, Mok KW. A data mining framework for building intrusion detection models. In Proceedings of the IEEE Symposium on Security and Privacy, 1999.
-
(1999)
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
139
-
-
14644441680
-
Visualization for security
-
Ma K-L. Visualization for security. Computer Graphics 2004; 38(4): 4-6.
-
(2004)
Computer Graphics
, vol.38
, Issue.4
, pp. 4-6
-
-
Ma, K.-L.1
-
140
-
-
84863379863
-
-
How Much Information, Available from:
-
Peter L, Varian HR. How Much Information, 2003. Available from:
-
(2003)
-
-
Peter, L.1
Varian, H.R.2
|