


default search action
CICS 2009: Nashville, TN, USA
- 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009. IEEE 2009, ISBN 978-1-4244-2769-7

Tutorial
- Dipankar Dasgupta:

Tutorial: computational intelligence in cyber security.
Network Attacks: analysis and detection
- Hoin Kim, Inyong Lee, Jaeik Cho, Jongsub Moon:

Visualization of network components for attack analysis. 1-8 - Manhyun Chung, Jaeik Cho, Jongsub Moon:

An effective denial of service detection method using kernel based data. 9-12 - Ran Tao, Li Yang, Lu Peng, Bin Li, Alma Cemerlic:

A case study: Using architectural features to improve sophisticated denial-of-service attack detections. 13-18 - Minsoo Lee, Xiaohui Ye, Samuel D. Johnson, Dan Marconett, Chaitanya S. K. Vadrevu, Rao Vemuri, S. J. Ben Yoo:

Cognitive security management with reputation based cooperation schemes in heterogeneous networks. 19-23
Malicious Code Detections
- Ochul Kwon, Seongjae Bae, Jaeik Cho, Jongsub Moon:

Study of fuzzy clustering methods for malicious codes using native API call frequency. 24-29 - Masanoei Hara, Akira Yamada

, Yutaka Miyake:
Visual similarity-based phishing detection without victim site information. 30-36 - Archana Bhattarai, Vasile Rus, Dipankar Dasgupta:

Characterizing comment spam in the blogosphere through content analysis. 37-44
File, Data and Process Security and Analysis
- Rajesh Kumar Pal, Indranil Sengupta:

Enhancing file data security in linux operating system by integrating secure file system. 45-52 - Nikolaos Chatzis, Radu Popescu-Zeletin, Nevil Brownlee

:
Email worm detection by wavelet analysis of DNS query streams. 53-60 - Qishi Wu, Denise Ferebee, Yunyue Lin, Dipankar Dasgupta:

Visualization of security events using an efficient correlation technique. 61-68 - Robert K. Abercrombie

, Frederick T. Sheldon
, Ali Mili:
Managing complex IT security processes with value based measures. 69-75 - Jiang Bian, Remzi Seker:

JigDFS: A secure distributed file system. 76-82
Intrusion Detection Systems
- Suvasini Panigrahi, Shamik Sural

, Arun K. Majumdar:
Detection of intrusive activity in databases by combining multiple evidences and belief update. 83-90 - Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, Steven K. Rogers:

Using qualia and multi-layered relationships in malware detection. 91-98 - Siddharth Gujral, Estefan Ortiz, Vassilis L. Syrmos:

An unsupervised method for intrusion detection using spectral clustering. 99-106 - Sourour Meharouech, Adel Bouhoula

, Tarek Abbes:
Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives. 107-114
Bio-Inspired Approaches
- Joseph A. Brown

, Sheridan K. Houghten, Beatrice M. Ombuki-Berman:
Genetic algorithm cryptanalysis of a substitution permutation network. 115-121 - Chet Langin, Hongbo Zhou, Shahram Rahimi, Bidyut Gupta, Mehdi R. Zargham, Mohammad R. Sayeh:

A self-organizing map and its modeling for discovering malignant network traffic. 122-129 - Eric S. Imsand, Deon Garrett, John A. Hamilton Jr.:

User identification using GUI manipulation patterns and artificial neural networks. 130-135 - Hilmi Günes Kayacik, Nur Zincir-Heywood

, Malcolm I. Heywood
, Stefan Burschka:
Generating mimicry attacks using genetic programming: A benchmarking study. 136-143 - Eric M. Holloway, Gary B. Lamont, Gilbert L. Peterson

:
Network security using self organized multi agent swarms. 144-151
Miscellaneous topics
- Sahin Renckes, Huseyin Polat, Yusuf Oysal:

Finding the state sequence maximizing P(O; I|λ) on distributed HMMs with Privacy. 152-158 - Stephen Torri, Winard Britt, John A. Hamilton Jr.:

A compiler classification framework for use in reverse engineering. 159-166 - Riyad Alshammari, Nur Zincir-Heywood

:
Generalization of signatures for SSH encrypted traffic identification. 167-174 - Li Yang, Feiqiong Liu, Joseph M. Kizza, Raimund K. Ege:

Discovering topics from dark websites. 175-179

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














