BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
theori (5)
sensor (2)
deduct (2)
network (2)
analysi (2)

Stem intrud$ (all stems)

13 papers:

KDDKDD-2013-Gesher #adaptation
Adaptive adversaries: building systems to fight fraud and cyber intruders (AG), p. 1136.
RTARTA-2009-BaudetCD #named
YAPA: A Generic Tool for Computing Intruder Knowledge (MB, VC, SD), pp. 148–163.
RTARTA-2009-TiuG #analysis #proving
A Proof Theoretic Analysis of Intruder Theories (AT, RG), pp. 103–117.
ICPRICPR-2008-GesuBF #identification
Intruders pattern identification (VDG, GLB, JHF), pp. 1–4.
CASECASE-2007-YooG #analysis #network #process
Intruder Activity Analysis under Unreliable Sensor Networks (TSY, HEG), pp. 578–584.
Intruders with Caps (SA, PN, MR), pp. 20–35.
CASECASE-2006-SchiffG #automation #network #using
Automated Intruder Tracking using Particle Filtering and a Network of Binary Motion Sensors (JS, KG), pp. 580–587.
Hierarchical Combination of Intruder Theories (YC, MR), pp. 108–122.
Combining Intruder Theories (YC, MR), pp. 639–651.
RTARTA-2005-LafourcadeLT #deduction #equation #morphism
Intruder Deduction for AC-Like Equational Theories with Homomorphisms (PL, DL, RT), pp. 308–322.
Intruder Theories (Ongoing Work) (HCL), pp. 1–4.
CSLCSL-2003-ChevalierKRTV #bound
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions (YC, RK, MR, MT, LV), pp. 128–141.
LICSLICS-2003-Comon-LundhS #constraints #deduction #theorem proving
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or (HCL, VS), p. 271–?.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.