BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
theori (5)
sensor (2)
deduct (2)
network (2)
analysi (2)

Stem intrud$ (all stems)

13 papers:

KDDKDD-2013-Gesher #adaptation
Adaptive adversaries: building systems to fight fraud and cyber intruders (AG), p. 1136.
RTARTA-2009-BaudetCD #named
YAPA: A Generic Tool for Computing Intruder Knowledge (MB, VC, SD), pp. 148–163.
RTARTA-2009-TiuG #analysis #proving
A Proof Theoretic Analysis of Intruder Theories (AT, RG), pp. 103–117.
ICPRICPR-2008-GesuBF #identification
Intruders pattern identification (VDG, GLB, JHF), pp. 1–4.
CASECASE-2007-YooG #analysis #network #process
Intruder Activity Analysis under Unreliable Sensor Networks (TSY, HEG), pp. 578–584.
RTARTA-2007-AnantharamanNR
Intruders with Caps (SA, PN, MR), pp. 20–35.
CASECASE-2006-SchiffG #automation #network #using
Automated Intruder Tracking using Particle Filtering and a Network of Binary Motion Sensors (JS, KG), pp. 580–587.
RTARTA-2006-ChevalierR
Hierarchical Combination of Intruder Theories (YC, MR), pp. 108–122.
ICALPICALP-2005-ChevalierR
Combining Intruder Theories (YC, MR), pp. 639–651.
RTARTA-2005-LafourcadeLT #deduction #equation #morphism
Intruder Deduction for AC-Like Equational Theories with Homomorphisms (PL, DL, RT), pp. 308–322.
FoSSaCSFoSSaCS-2004-Comon-Lundh
Intruder Theories (Ongoing Work) (HCL), pp. 1–4.
CSLCSL-2003-ChevalierKRTV #bound
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions (YC, RK, MR, MT, LV), pp. 128–141.
LICSLICS-2003-Comon-LundhS #constraints #deduction #theorem proving
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or (HCL, VS), p. 271–?.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.