Detecting Stepping-Stone Intruders By Identifying Crossover Packets In Ssh Connections | 1 | 0.36 | 2016 |
A Multi-Objective Flow Cytometry Profiling for B-Cell Lymphoma Diagnosis. | 0 | 0.34 | 2016 |
Detecting stepping-stones under the influence of packet jittering | 0 | 0.34 | 2013 |
Automatic B cell lymphoma detection using flow cytometry data. | 2 | 0.52 | 2012 |
Detecting Intruders Using a Long Connection Chain to Connect to a Host | 2 | 0.39 | 2011 |
Detecting Chaff Perturbation on Stepping-Stone Connection | 1 | 0.36 | 2011 |
Packet-based algorithms for stepping-stone detection with chaff perturbation | 0 | 0.34 | 2011 |
Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain | 0 | 0.34 | 2010 |
Detect multi-hop stepping-stone pairs with clock skew | 2 | 0.38 | 2010 |
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching | 2 | 0.40 | 2010 |
Neural networks-based detection of stepping-stone intrusion | 6 | 0.51 | 2010 |
Detecting Stepping-Stone Connection Using Association Rule Mining | 1 | 0.35 | 2009 |
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion | 2 | 0.38 | 2009 |
A Multidimensional Flow Cytometry Data Classification | 0 | 0.34 | 2009 |
Masquerade Detection Using Command Prediction and Association Rules Mining | 2 | 0.40 | 2009 |
Detecting Stepping-Stone Intruders with Long Connection Chains | 2 | 0.40 | 2009 |
An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets | 7 | 0.55 | 2008 |
Monitoring Network Traffic to Detect Stepping-Stone Intrusion | 7 | 0.55 | 2008 |
User Behavior Analysis in Masquerade Detection Using Principal Component Analysis | 4 | 0.58 | 2008 |
Detecting Masqueraders Using High Frequency Commands as Signatures | 4 | 0.46 | 2008 |
Integrating Direct3D Programming into Computer Science Curriculum | 1 | 0.43 | 2008 |
Mining TCP/IP packets to detect stepping-stone intrusion | 12 | 0.67 | 2007 |
Detecting Stepping-Stone with Chaff Perturbations | 6 | 0.56 | 2007 |
Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection | 4 | 0.48 | 2007 |
Stepping-stone detection algorithm based on order preserving mapping | 7 | 0.57 | 2007 |
A Dynamic Mobility Management Scheme for VoIP Services | 2 | 0.43 | 2006 |
A clustering-partitioning algorithm to find TCP packet round-trip time for intrusion detection | 8 | 0.61 | 2006 |
Resistance analysis to intruders' evasion of detecting intrusion | 2 | 0.40 | 2006 |
Finding the longest similar subsequence of thumbprints for intrusion detection | 1 | 0.36 | 2006 |
Matching TCP packets and its application to the detection of long connection chains on the Internet | 17 | 1.03 | 2005 |
Improved thumbprint and its application for intrusion detection | 0 | 0.34 | 2005 |
Exploring Similarity among Web Pages Using the Hyperlink Structure | 1 | 0.35 | 2004 |
R2H: A Framework to Transform Relations into Hypertext | 0 | 0.34 | 2002 |
WebLQM : A Web Community Examiner | 0 | 0.34 | 2001 |
An Efficient Parallel Em Algorithm: A Sparse Matrix Compaction Technique | 0 | 0.34 | 1999 |
Inter-Iteration Optimization of Parallel EM Algorithm on Message-Passing Multicomputers | 2 | 0.49 | 1998 |
(R) Edge Embedding of Two-Dimensional Grids in Hypercubes with Dilation Two and Congestion Three | 0 | 0.34 | 1996 |
A New Combinatorial Approach to Optimal Embeddings of Rectangles | 7 | 0.70 | 1996 |
Embedding Two-Dimensional Grids into Hypercubes with Dilation 2 and Congestion 5 | 1 | 0.36 | 1995 |
DAVID Universal Books Management System | 4 | 6.01 | 1991 |
A sublinear parallel algorithm for some dynamic programming problems | 1 | 0.37 | 1990 |
Parallel dynamic programming | 5 | 0.55 | 1990 |
A VLSI partition algorithm | 0 | 0.34 | 1988 |
Optimal multiway split trees | 2 | 0.42 | 1987 |
Faster construction of optimal binary split trees | 11 | 0.83 | 1986 |
Ordered priority queues | 0 | 0.34 | 1986 |
Height balanced trees of order (beta,gamma,delta) | 14 | 30.77 | 1985 |
Multidimensional extendible hashing for partial-match queries | 2 | 0.36 | 1985 |
Optimal binary split trees | 10 | 1.08 | 1984 |
Generalized binary split trees | 8 | 1.03 | 1984 |