Login / Signup
CICS
2009
2014
2009
2014
Keyphrases
Publications
2014
Mohiuddin Solaimani
,
Mohammed Iftekhar
,
Latifur Khan
,
Bhavani M. Thuraisingham
,
Joey Burton Ingram
Spark-based anomaly detection over multi-source VMware performance data in real-time.
CICS
(2014)
2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014
CICS
(2014)
Sebastian Obermeier
,
Michael Wahler
,
Thanikesavan Sivanthi
,
Roman Schlegel
,
Aurelien Monot
Automatic attack surface reduction in next-generation industrial control systems.
CICS
(2014)
El-Sayed M. El-Alfy
,
Ali A. Al-Hasan
A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm.
CICS
(2014)
Ugur Pehlivan
,
Nuray Baltaci
,
Cengiz Acartürk
,
Nazife Baykal
The analysis of feature selection methods and classification algorithms in permission based Android malware detection.
CICS
(2014)
Eray Balkanli
,
Jander Alves
,
A. Nur Zincir-Heywood
Supervised learning to detect DDoS attacks.
CICS
(2014)
Dipankar Dasgupta
,
Denise Ferebee
,
Sanjib Kumar Saha
,
Abhijit Kumar Nag
,
Kul Prasad Subedi
,
Alvaro Madero
,
Abel Sanchez
,
John R. Williams
G-NAS: A grid-based approach for negative authentication.
CICS
(2014)
El-Sayed M. El-Alfy
,
Asem A. Ghaleb
Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study.
CICS
(2014)
Karel P. Bergmann
,
Jörg Denzinger
Automated testing for cyber threats to ad-hoc wireless networks.
CICS
(2014)
Khalid Shahbar
,
A. Nur Zincir-Heywood
Benchmarking two techniques for Tor classification: Flow level and circuit level classification.
CICS
(2014)
Carlos A. S. Assis
,
Adriano César Machado Pereira
,
Marconi de Arruda Pereira
,
Eduardo G. Carrano
A genetic programming approach for fraud detection in electronic transactions.
CICS
(2014)
Arisoa S. Randrianasolo
,
Larry D. Pyeatt
A theoretical Q-learning temporary security repair.
CICS
(2014)
Anis Ben Aissa
,
Robert K. Abercrombie
,
Frederick T. Sheldon
,
Ali Mili
Quantifying the impact of unavailability in cyber-physical environments.
CICS
(2014)
Foaad Khosmood
,
Phillip L. Nico
,
Jonathan Woolery
User identification through command history analysis.
CICS
(2014)
2013
Sanjay Rawat
,
Fabien Duchene
,
Roland Groz
,
Jean-Luc Richier
Evolving indigestible codes: Fuzzing interpreters with genetic programming.
CICS
(2013)
Chirag Modi
,
Dhiren R. Patel
A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing.
CICS
(2013)
Hossein Rahimi
,
A. Nur Zincir-Heywood
,
Bharat Gadher
Indoor geo-fencing and access control for wireless networks.
CICS
(2013)
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore
CICS
(2013)
S. Ganesh Babu
,
Ilango Paramasivam
Higher dimensional chaos for Audio encryption.
CICS
(2013)
Simon Miller
,
Jonathan M. Garibaldi
,
Susan Appleby
Evolving OWA operators for cyber security decision making problems.
CICS
(2013)
Mahendra Piraveenan
,
Shahadat Uddin
,
Kon Shing Kenneth Chung
,
Dharshana Kasthurirathna
Quantifying encircling behaviour in complex networks.
CICS
(2013)
Kesav Kancherla
,
Srinivas Mukkamala
Image visualization based malware detection.
CICS
(2013)
Shubhalaxmi Kher
,
Victor Nutt
,
Dipankar Dasgupta
Resilient hybrid overlay model for smart grid: RHM for smart grid.
CICS
(2013)
Hector M. Lugo-Cordero
,
Ratan K. Guha
What defines an intruder? An intelligent approach.
CICS
(2013)
Marcos Álvares Barbosa Junior
,
Tshilidzi Marwala
,
Fernando Buarque de Lima Neto
Applications of computational intelligence for static software checking against memory corruption vulnerabilities.
CICS
(2013)
2011
Ferdous A. Barbhuiya
,
Santosh Biswas
,
Neminath Hubballi
,
Sukumar Nandi
A host based DES approach for detecting ARP spoofing.
CICS
(2011)
Anita Zakrzewska
,
Erik M. Ferragut
Modeling cyber conflicts using an extended Petri Net formalism.
CICS
(2011)
Omar Al-Ibrahim
,
Suku Nair
Security fusion based on state machine compositions.
CICS
(2011)
David L. Hancock
,
Gary B. Lamont
Multi agent systems on military networks.
CICS
(2011)
Amal Ben Hamida
,
Mohamed Koubàa
,
Chokri Ben Amar
,
Henri Nicolas
Hierarchical traceability of multimedia documents.
CICS
(2011)
Justin Zhan
,
Lijo Thomas
Phishing detection using stochastic learning-based weak estimators.
CICS
(2011)
Stephen M. Woskov
,
Michael R. Grimaila
,
Robert F. Mills
,
Michael W. Haas
Design considerations for a case-based reasoning engine for scenario-based cyber incident notification.
CICS
(2011)
Dean Lee
,
Samuel N. Hamilton
,
Wendy L. Hamilton
Modeling Cyber Knowledge uncertainty.
CICS
(2011)
Jennifer T. Jackson
,
Sadie Creese
,
Mark S. Leeson
Biodiversity: A security approach for ad hoc networks.
CICS
(2011)
Senhua Yu
,
Dipankar Dasgupta
An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation.
CICS
(2011)
Paul K. Harmer
,
Ryan W. Thomas
,
Brady Christel
,
Richard K. Martin
,
Clifton Watson
Wireless security situation awareness with attack identification decision support.
CICS
(2011)
Sara Hajian
,
Josep Domingo-Ferrer
,
Antoni Martínez-Ballesté
Discrimination prevention in data mining for intrusion and crime detection.
CICS
(2011)
Harkeerat Singh Bedi
,
Sankardas Roy
,
Sajjan G. Shiva
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows.
CICS
(2011)
Justin Zhan
,
Xing Fang
,
Naveen Bandaru
Location privacy protection on social networks.
CICS
(2011)
Yi Hu
,
Charles E. Frank
,
James Walden
,
Emily Crawford
,
Dhanuja Kasturiratna
Profiling file repository access patterns for identifying data exfiltration activities.
CICS
(2011)
Scott Musman
,
Mike Tanner
,
Aaron Temin
,
Evan Elsaesser
,
Lewis Loren
A systems engineering approach for crown jewels estimation and mission assurance decision making.
CICS
(2011)
Denise Ferebee
,
Dipankar Dasgupta
,
Michael Schmidt
,
Qishi Wu
Security visualization: Cyber security storm map and event correlation.
CICS
(2011)
2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011
CICS
(2011)
Martin Rehák
,
Jan Stiborek
,
Martin Grill
Intelligence, not integration: Distributed regret minimization for IDS Control.
CICS
(2011)
James L. Miller
,
Robert F. Mills
,
Michael R. Grimaila
,
Michael W. Haas
A scalable architecture for improving the timeliness and relevance of cyber incident notifications.
CICS
(2011)
Justin Zhan
,
Xing Fang
,
Peter Killion
Trust optimization in task-oriented social networks.
CICS
(2011)
Ran Liu
,
Wenjian Luo
,
Xufa Wang
A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases.
CICS
(2011)
Patrick LaRoche
,
A. Nur Zincir-Heywood
,
Malcolm I. Heywood
Exploring the state space of an application protocol: A case study of SMTP.
CICS
(2011)
Carlos Bacquet
,
A. Nur Zincir-Heywood
,
Malcolm I. Heywood
Genetic optimization and hierarchical clustering applied to encrypted traffic identification.
CICS
(2011)
Erik M. Ferragut
,
David M. Darmon
,
Craig Aaron Shue
,
Stephen Kelley
Automatic construction of anomaly detectors from graphical models.
CICS
(2011)