Search


Current filters:

Start a new search
Add filters:

Use filters to refine the search results.


Results 1-10 of 13 (Search time: 0.003 seconds).
Item hits:
PreviewIssue DateTitleAuthor(s)
2006Janus: A two-sided analytical model for multi-stage coordinated attacksZhang, Z.; Ho, P.; Lin, X.; Shen, H.; ICISC 2006 (2006 : Busan, Korea)
2005Dynamic combination of multiple host-based anomaly detectors with broader detection coverage and fewer false alertsZhang, Z.; Shen, H.; International Conference on Networking (4th : 2005 : ReĢunion)
2007An observation-centric analysis on the modeling of anomaly-based intrusion detectionZhang, Z.; Shen, H.; Sang, Y.
2005Constructing multi-layered boundary to defend against intrusive anomalies: an autonomic detection coordinatorZhang, Z.; Shen, H.; International Conference on Dependable Systems and Networks (2005 : Yokohama-shi, Japan)
2004Online training of SVMs for real-time intrusion detectionZhang, Z.; Shen, H.; International Conference on Advanced Information Networking and Applications (18th : 2004 : Fukuoka, Japan)
2005An efficient protocol for the problem of secure two-party vector dominanceSang, Y.; Shen, H.; Zhang, Z.; International Conference on Parallel and Distributed Computing, Applications and Technologies (6th : 2005 : Dalian, China)
2004Capture the drifting of normal behavior traces for adaptive intrusion detection using modified SVMSZhang, Z.; Shen, H.; International Conference on Machine Learning and Cybernetics (3rd : 2004 : Shangai, China)
2004Suppressing false alarms of intrusion detection using improved text categorization methodZhang, Z.; Shen, H.; IEEE International Conference on e-Technology, e-Commerce, and e-Service (2004 : Taipei, Taiwan)
2005Application of online-training SVMs for real-time intrusion detection with different considerationsZhang, Z.; Shen, H.
2016Achieving probabilistic anonymity in a linear and hybrid randomization modelSang, Y.; Shen, H.; Tian, H.; Zhang, Z.