BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
detect (63)
non (38)
system (31)
network (24)
base (16)

Stem intrus$ (all stems)

112 papers:

CHICHI-2015-GoelZVP #detection #flexibility #gesture #named #using
Tongue-in-Cheek: Using Wireless Signals to Enable Non-Intrusive and Flexible Facial Gestures Detection (MG, CZ, RV, SNP), pp. 255–258.
ICSEICSE-v1-2015-NistorCRL #detection #named #performance #problem
CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes (AN, PCC, CR, SL), pp. 902–912.
ICSEICSE-v1-2015-WhalenPRSG #approach #flexibility #metric
A Flexible and Non-intrusive Approach for Computing Complex Structural Coverage Metrics (MWW, SP, NR, MS, DG), pp. 506–516.
ICSTICST-2015-Haser #integration #testing
Non-Intrusive Documentation-Driven Integration Testing (FH), pp. 1–2.
CASECASE-2014-LaiTCL #energy #industrial #monitoring #performance
Non-Intrusive Load Monitoring applied in energy efficiency of the smart manufacturing industry: A case of air-conditioner (YHL, IJT, CYC, CFL), pp. 1127–1132.
DACDAC-2014-AndraudSS
One-Shot Calibration of RF Circuits Based on Non-Intrusive Sensors (MA, HGDS, ES), p. 2.
DATEDATE-2014-AbeleinCEGRGRTUW #architecture #integration
Non-intrusive integration of advanced diagnosis features in automotive E/E-architectures (UA, AC, PE, MG, FR, LRG, TR, JT, DU, HJW), pp. 1–6.
CHICHI-2014-ZhangGTR #interface
Non-intrusive tongue machine interface (QZ, SG, BT, RPNR), pp. 2555–2558.
ICPRICPR-2014-RidiGH #bibliography #monitoring #recognition
A Survey on Intrusive Load Monitoring for Appliance Recognition (AR, CG, JH), pp. 3702–3707.
OSDIOSDI-2014-ZhaoZLULYS #distributed #named #profiling
lprof: A Non-intrusive Request Flow Profiler for Distributed Systems (XZ, YZ, DL, MFU, YL, DY, MS), pp. 629–644.
CBSECBSE-2013-BurtonS #correctness #data type #mixin #using
Correctness of intrusive data structures using mixins (EB, ES), pp. 53–58.
ECSAECSA-2013-SilvaB #architecture #automation #consistency #named
PANDArch: A Pluggable Automated Non-intrusive Dynamic Architecture Conformance Checker (LdS, DB), pp. 240–248.
QoSAQoSA-2013-AgrawalST #multi #quality
A multi-dimensional measure for intrusion: the intrusiveness quality attribute (AA, BS, TVP), pp. 63–68.
DATEDATE-2013-Moy #approach #modelling #parallel #programming
Parallel programming with SystemC for loosely timed models: a non-intrusive approach (MM), pp. 9–14.
HCIHIMI-D-2013-SilvaZGBSV #question
Are the Intrusive Effects of SPAM Probes Present When Operators Differ by Skill Level and Training? (HIS, JZ, TG, VB, TZS, KPLV), pp. 269–275.
MLDMMLDM-2013-Suthaharan #big data #classification #network
A Single-Domain, Representation-Learning Model for Big Data Classification of Network Intrusion (SS), pp. 296–310.
SEKESEKE-2013-GomedeB #development #process #quality #re-engineering
A Non-Intrusive Process to Software Engineering Decision Support focused on increasing the Quality of Software Development (S) (EG, RMB), pp. 95–100.
SACSAC-2013-RieckerBH #detection #energy #lightweight #network
Lightweight energy consumption based intrusion detection system for wireless sensor networks (MR, SB, MH), pp. 1784–1791.
LCTESLCTES-2013-MorenoFH #analysis #debugging #embedded
Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis (CM, SF, MAH), pp. 77–88.
SOSPSOSP-2013-ChandraKZ #web #web service
Asynchronous intrusion recovery for interconnected web services (RC, TK, NZ), pp. 213–227.
DACDAC-2012-HuangLWT #interface
A non-intrusive timing synchronization interface for hardware-assisted HW/SW co-simulation (YHH, YSL, HIW, RST), pp. 127–132.
DATEDATE-2012-AbdallahSMA #testing
Testing RF circuits with true non-intrusive built-in sensors (LA, HGDS, SM, JA), pp. 1090–1095.
KDDKDD-2012-DingKBKC #anti #communication #detection #social
Intrusion as (anti)social communication: characterization and detection (QD, NK, PB, EDK, MC), pp. 886–894.
KDIRKDIR-2012-LemnaruTCP #case study #classification #detection #hybrid #network #problem
A Hybrid Solution for Imbalanced Classification Problems — Case Study on Network Intrusion Detection (CL, ATV, AC, RP), pp. 348–352.
MLDMMLDM-2012-SyarifZPW #detection
Application of Bagging, Boosting and Stacking to Intrusion Detection (IS, EZ, APB, GW), pp. 593–602.
SACSAC-2012-InzingerSHLD #adaptation #optimisation #policy
Non-intrusive policy optimization for dependable and adaptive service-oriented systems (CI, BS, WH, PL, SD), pp. 504–510.
SACSAC-2012-MoraisC #ad hoc #detection #distributed #network
A distributed intrusion detection scheme for wireless ad hoc networks (ANPM, ARC), pp. 556–562.
PADLPADL-2011-SalgueiroDBA #constraints #detection #using
Using Constraints for Intrusion Detection: The NeMODe System (PDS, DD, IB, SA), pp. 115–129.
SOSPSOSP-2011-ChandraKSNZ #web
Intrusion recovery for database-backed web applications (RC, TK, MS, NN, NZ), pp. 101–114.
DATEDATE-2010-BolteSBNB #using
Non-intrusive virtualization management using libvirt (MB, MS, GB, ON, AB), pp. 574–579.
DATEDATE-2010-WenCCL #debugging #named #parallel #runtime #source code
RunAssert: A non-intrusive run-time assertion for parallel programs debugging (CNW, SHC, TFC, TJL), pp. 287–290.
ICPRICPR-2010-MalakutiA #monitoring #towards
Towards an Intelligent Bed Sensor: Non-intrusive Monitoring of Sleep Irregularities with Computer Vision Techniques (KM, ABA), pp. 4004–4007.
ICPRICPR-2010-NguyenFP #detection #towards
Towards a Generic Feature-Selection Measure for Intrusion Detection (HTN, KF, SP), pp. 1529–1532.
SEKESEKE-2010-ShinPS #detection
Detection of Malicious Software Engineer Intrusion (MES, NP, SS), pp. 565–570.
OSDIOSDI-2010-KimWZK #using
Intrusion Recovery Using Selective Re-execution (TK, XW, NZ, MFK), pp. 89–104.
DACDAC-2009-ShankarL #multi #profiling
Non-intrusive dynamic application profiling for multitasked applications (KS, RLL), pp. 130–135.
DACDAC-2009-WalravensVD #analysis #modelling #named #performance
ActivaSC: a highly efficient and non-intrusive extension for activity-based analysis of SystemC models (CW, YV, WD), pp. 172–177.
DACDAC-2009-WenCCS #architecture #concurrent #debugging #detection #manycore #named
NUDA: a non-uniform debugging architecture and non-intrusive race detection for many-core (CNW, SHC, TFC, APS), pp. 148–153.
HCIDHM-2009-ThomasDAS #evaluation #personalisation
Non-intrusive Personalized Mental Workload Evaluation for Exercise Intensity Measure (NLT, YD, TA, JHS), pp. 315–322.
HCIHIMI-II-2009-KushiroKNI #behaviour #health #monitoring
Non-intrusive Human Behavior Monitoring Sensor for Health Care System (NK, MK, MN, YI), pp. 549–558.
SACSAC-2009-MaoLPCH #approach #detection #learning #multi
Semi-supervised co-training and active learning based approach for multi-view intrusion detection (CHM, HML, DP, TC, SYH), pp. 2042–2048.
DATEDATE-2008-ChoudhuryM #approximate #concurrent #detection #fault #logic
Approximate logic circuits for low overhead, non-intrusive concurrent error detection (MRC, KM), pp. 903–908.
DATEDATE-2008-DasMJZMC #analysis #component #detection #implementation #network #performance
An Efficient FPGA Implementation of Principle Component Analysis based Network Intrusion Detection System (AD, SM, SJ, JZ, GM, ANC), pp. 1160–1165.
ICEISICEIS-HCI-2008-LucaB #design #implementation #navigation #recommendation
Microformats Based Navigation Assistant — A Non-intrusive Recommender Agent: Design and Implementation (APL, SCB), pp. 54–61.
ICPRICPR-2008-YangQ #analysis #component #detection #independence #network #using
A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
SEKESEKE-2008-CemerlicYK #detection #network
Network Intrusion Detection Based on Bayesian Networks (AC, LY, JMK), pp. 791–794.
SACSAC-2008-KuangZ #algorithm #detection #using
An anomaly intrusion detection method using the CSI-KNN algorithm (LK, MZ), pp. 921–926.
SACSAC-2008-LoTP #detection #hardware #implementation #network #regular expression
Hardware implementation for network intrusion detection rules with regular expression support (CTDL, YGT, KP), pp. 1535–1539.
SACSAC-2008-SpinosaCG #clustering #concept #data type #detection #network #novel
Cluster-based novel concept detection in data streams applied to intrusion detection in computer networks (EJS, ACPLFdC, JG), pp. 976–980.
CASECASE-2007-FagioliniVPDB #detection #distributed #implementation #monitoring #multi
Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi-Agent Systems (AF, GV, LP, GD, AB), pp. 454–459.
DATEDATE-2007-SinanogluP #approach
A non-intrusive isolation approach for soft cores (OS, TP), pp. 27–32.
CHICHI-2007-ThompsonRYB #detection #interface #visual notation
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection (RST, EMR, WY, BPB), p. 1205.
HCIHCI-AS-2007-McCoyEPG #online
Online Ad Intrusiveness (SM, AE, PP, DFG), pp. 86–89.
ICEISICEIS-HCI-2007-MelguizoBDBB #memory management #recommendation #what
What a Proactive Recommendation System Needs — Relevance, Non-Intrusiveness, and a New Long-Term Memory (MCPM, TB, AD, LB, AvdB), pp. 86–91.
MLDMMLDM-2007-MicarelliS #approach #detection
A Case-Based Approach to Anomaly Intrusion Detection (AM, GS), pp. 434–448.
MLDMMLDM-2007-SadoddinG #case study #comparative #data mining #detection #machine learning #mining
A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection (RS, AAG), pp. 404–418.
SEKESEKE-2007-KanaskarSR #analysis #approach #detection #using
A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
MODELSMoDELS-2007-MassicotteCBL #detection #modelling
Model-Driven, Network-Context Sensitive Intrusion Detection (FM, MC, LCB, YL), pp. 61–75.
MODELSMoDELS-2007-MassicotteCBL #detection #modelling
Model-Driven, Network-Context Sensitive Intrusion Detection (FM, MC, LCB, YL), pp. 61–75.
SACSAC-2007-MeddebDB #detection
Global intrusion detection and tolerance in networked systems (AM, YD, NB), pp. 188–189.
SACSAC-2007-SoleimaniADDBA #detection #named #reliability
RAAS: a reliable analyzer and archiver for snort intrusion detection system (MS, EKA, MD, MD, AB, MA), pp. 259–263.
SACSAC-2007-YiKOJKD #detection #hardware #performance
Memory-efficient content filtering hardware for high-speed intrusion detection systems (SY, BKK, JO, JJ, GK, CRD), pp. 264–269.
PPoPPPPoPP-2007-SchuffCP #detection #network #parallel
Conservative vs. optimistic parallelization of stateful network intrusion detection (DLS, YRC, VSP), pp. 138–139.
CSMRCSMR-2006-Boffoli #monitoring #quality
Non-Intrusive Monitoring of Software Quality (NB), pp. 319–322.
SEKESEKE-2006-SornilS #detection #using
Improving Intrusion Detection Systems Using Reference Vectors (OS, PS), pp. 398–403.
ASEASE-2005-Kemmerer #design #detection #implementation #product line
Designing and implementing a family of intrusion detection systems (RAK), p. 3.
HTHT-2005-BlusteinFS #detection #visualisation
Information visualization for an intrusion detection system (JB, CLF, DLS), pp. 278–279.
ITiCSEITiCSE-2005-TobinW #education #security #using
Using a windows attack intRusion emulator (AWARE) to teach computer security awareness (DLTJ, MSW), pp. 213–217.
AdaEuropeAdaEurope-2005-LundqvistSG #fault tolerance
Non-intrusive System Level Fault-Tolerance (KL, JS, SG), pp. 156–166.
ICEISICEIS-v2-2005-Diaz-GomezH #algorithm #detection #search-based #using
Improved Off-Line Intrusion Detection Using a Genetic Algorithm (PADG, DFH), pp. 66–73.
ICEISICEIS-v2-2005-ZengG #detection #integration
Agent-Based Intrusion Detection System for Integration (JZ, DG), pp. 176–181.
ICEISICEIS-v4-2005-YiZZ #ad hoc #architecture #detection #mobile #network #using
An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks (PY, SZ, YZ), pp. 220–226.
MLDMMLDM-2005-GiacintoPR #clustering #detection #network
Alarm Clustering for Intrusion Detection Systems in Computer Networks (GG, RP, FR), pp. 184–193.
MLDMMLDM-2005-Sy #approach #detection
Signature-Based Approach for Intrusion Detection (BKS), pp. 526–536.
SACSAC-2005-DuanHW #detection #network
Enhancing network intrusion detection systems with interval methods (QD, CH, HCW), pp. 1444–1448.
SACSAC-2005-HouD #analysis #design #detection #search-based
Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA’s genetic arms race (HH, GVD), pp. 952–956.
CGOCGO-2005-ZhangZP
Building Intrusion-Tolerant Secure Software (TZ, XZ, SP), pp. 255–266.
SOSPSOSP-2005-GoelPFLL
The taser intrusion recovery system (AG, KP, KF, ZL, EdL), pp. 163–176.
SOSPSOSP-2005-JoshiKDC #detection
Detecting past and present intrusions through vulnerability-specific predicates (AJ, STK, GWD, PMC), pp. 91–104.
CAVCAV-2005-OlivainG #detection
The Orchids Intrusion Detection Tool (JO, JGL), pp. 286–290.
CSMRCSMR-2004-Torchiano #approach #comprehension #empirical #modelling
Empirical Investigation of a Non-Intrusive Approach to Study Comprehension Cognitive Models (MT), pp. 184–194.
CSCWCSCW-2004-GoodallLK #collaboration #detection #network
I know my network: collaboration and expertise in intrusion detection (JRG, WGL, AK), pp. 342–345.
ICEISICEIS-v3-2004-MukkamalaSAR #adaptation #detection #using
Intrusion Detection Systems Using Adaptive Regression Splines (SM, AHS, AA, VR), pp. 26–33.
SACSAC-2004-AmorBE #detection #naive bayes
Naive Bayes vs decision trees in intrusion detection systems (NBA, SB, ZE), pp. 420–424.
SACSAC-2004-HuP #approach #data mining #database #detection #mining
A data mining approach for database intrusion detection (YH, BP), pp. 711–716.
SACSAC-2004-Wang
The loop fallacy and serialization in tracing intrusion connections through stepping stones (XW), pp. 404–411.
SACSAC-2004-ZaneroS #detection #learning
Unsupervised learning techniques for an intrusion detection system (SZ, SMS), pp. 412–419.
DATEDATE-2003-DrineasM #concurrent #detection #fault #monitoring
Non-Intrusive Concurrent Error Detection in FSMs through State/Output Compaction and Monitoring via Parity Trees (PD, YM), pp. 11164–11167.
VLDBVLDB-2003-HulgeriS #cost analysis #named #optimisation #parametricity #query
AniPQO: Almost Non-intrusive Parametric Query Optimization for Nonlinear Cost Functions (AH, SS), pp. 766–777.
ICEISICEIS-v3-2003-HoangHB #data mining #detection #mining
Intrusion Detection Based on Data Mining (XDH, JH, PB), pp. 341–346.
KDDKDD-2003-OteyPGLNP #detection #towards
Towards NIC-based intrusion detection (MEO, SP, AG, GL, SN, DKP), pp. 723–728.
SACSAC-2003-BarbaraLLJC #data mining #detection #mining
Bootstrapping a Data Mining Intrusion Detection System (DB, YL, JLL, SJ, JC), pp. 421–425.
ESEC-FSEESEC-FSE-2003-VignaVK #design #detection #implementation #product line
Designing and implementing a family of intrusion detection systems (GV, FV, RAK), pp. 88–97.
ICSEICSE-2003-KemmererV #detection #internet #security
Internet Security and Intrusion Detection (RAK, GV), pp. 748–749.
SOSPSOSP-2003-KingC #backtracking
Backtracking intrusions (STK, PMC), pp. 223–236.
ICEISICEIS-2002-LowLT #database #detection #named #transaction
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions (WLL, JL, PT), pp. 121–128.
ICPRICPR-v2-2002-GiacintoR #classification #detection #multi #network
Intrusion Detection in Computer Networks by Multiple Classifier Systems (GG, FR), pp. 390–393.
ICPRICPR-v4-2002-YeungC #detection #network
Parzen-Window Network Intrusion Detectors (DYY, CC), pp. 385–388.
KDDKDD-2002-JulischD #detection #mining
Mining intrusion detection alarms for actionable knowledge (KJ, MD), pp. 366–375.
KDDKDD-2002-SequeiraZ #data mining #mining #named
ADMIT: anomaly-based data mining for intrusions (KS, MJZ), pp. 386–395.
SACSAC-2002-KrugelTK #detection #network
Service specific anomaly detection for network intrusion detection (CK, TT, EK), pp. 201–208.
SACSAC-2002-SeleznyovM #detection #learning
Learning temporal patterns for anomaly intrusion detection (AS, OM), pp. 209–213.
OSDIOSDI-2002-DunlapKCBC #analysis #named
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay (GWD, STK, SC, MAB, PMC), pp. 211–224.
TOOLSTOOLS-EUROPE-2000-SridharanMM #corba #distributed #monitoring #testing
Non-Intrusive Testing, Monitoring and Control of Distributed CORBA Objects (BS, SM, APM), p. 195–?.
HPDCHPDC-2000-WolskiGT #metric #network
Synchronizing Network Probes to Avoid Measurement Intrusiveness with the Network Weather Service (RW, BG, BT), pp. 147–154.
KDDKDD-1999-LeeSM #data flow #detection #experience #mining #network
Mining in a Data-Flow Environment: Experience in Network Intrusion Detection (WL, SJS, KWM), pp. 114–124.
KDDKDD-1998-DuMouchelS #algorithm #detection #performance #testing
A Fast Computer Intrusion Detection Algorithm Based on Hypothesis Testing of Command Transition Probabilities (WD, MS), pp. 189–193.
KDDKDD-1998-LeeSM #detection #mining #modelling
Mining Audit Data to Build Intrusion Detection Models (WL, SJS, KWM), pp. 66–72.
ICSEICSE-1998-ChuangKW #architecture #c++
Non-Intrusive Object Introspection in C++: Architecture and Application (TRC, YSK, CMW), pp. 312–321.
DATEEDAC-1994-HarrisO #concurrent #fine-grained #scheduling
Fine-Grained Concurrency in Test Scheduling for Partial-Intrusion BIST (IGH, AO), pp. 119–123.
HTECHT-1990-IrlerB #hypermedia
Non-Intrusive Hypertext Anchors and Individual Colour Markings (WJI, GB), pp. 261–273.
PPoPPPPEALS-1988-AralG #interactive #profiling
Non-Intrusive and Interactive Profiling in Parasight (ZA, IG), pp. 21–30.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.