112 papers:
- CHI-2015-GoelZVP #detection #flexibility #gesture #named #using
- Tongue-in-Cheek: Using Wireless Signals to Enable Non-Intrusive and Flexible Facial Gestures Detection (MG, CZ, RV, SNP), pp. 255–258.
- ICSE-v1-2015-NistorCRL #detection #named #performance #problem
- CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes (AN, PCC, CR, SL), pp. 902–912.
- ICSE-v1-2015-WhalenPRSG #approach #flexibility #metric
- A Flexible and Non-intrusive Approach for Computing Complex Structural Coverage Metrics (MWW, SP, NR, MS, DG), pp. 506–516.
- ICST-2015-Haser #integration #testing
- Non-Intrusive Documentation-Driven Integration Testing (FH), pp. 1–2.
- CASE-2014-LaiTCL #energy #industrial #monitoring #performance
- Non-Intrusive Load Monitoring applied in energy efficiency of the smart manufacturing industry: A case of air-conditioner (YHL, IJT, CYC, CFL), pp. 1127–1132.
- DAC-2014-AndraudSS
- One-Shot Calibration of RF Circuits Based on Non-Intrusive Sensors (MA, HGDS, ES), p. 2.
- DATE-2014-AbeleinCEGRGRTUW #architecture #integration
- Non-intrusive integration of advanced diagnosis features in automotive E/E-architectures (UA, AC, PE, MG, FR, LRG, TR, JT, DU, HJW), pp. 1–6.
- CHI-2014-ZhangGTR #interface
- Non-intrusive tongue machine interface (QZ, SG, BT, RPNR), pp. 2555–2558.
- ICPR-2014-RidiGH #bibliography #monitoring #recognition
- A Survey on Intrusive Load Monitoring for Appliance Recognition (AR, CG, JH), pp. 3702–3707.
- OSDI-2014-ZhaoZLULYS #distributed #named #profiling
- lprof: A Non-intrusive Request Flow Profiler for Distributed Systems (XZ, YZ, DL, MFU, YL, DY, MS), pp. 629–644.
- CBSE-2013-BurtonS #correctness #data type #mixin #using
- Correctness of intrusive data structures using mixins (EB, ES), pp. 53–58.
- ECSA-2013-SilvaB #architecture #automation #consistency #named
- PANDArch: A Pluggable Automated Non-intrusive Dynamic Architecture Conformance Checker (LdS, DB), pp. 240–248.
- QoSA-2013-AgrawalST #multi #quality
- A multi-dimensional measure for intrusion: the intrusiveness quality attribute (AA, BS, TVP), pp. 63–68.
- DATE-2013-Moy #approach #modelling #parallel #programming
- Parallel programming with SystemC for loosely timed models: a non-intrusive approach (MM), pp. 9–14.
- HIMI-D-2013-SilvaZGBSV #question
- Are the Intrusive Effects of SPAM Probes Present When Operators Differ by Skill Level and Training? (HIS, JZ, TG, VB, TZS, KPLV), pp. 269–275.
- MLDM-2013-Suthaharan #big data #classification #network
- A Single-Domain, Representation-Learning Model for Big Data Classification of Network Intrusion (SS), pp. 296–310.
- SEKE-2013-GomedeB #development #process #quality #re-engineering
- A Non-Intrusive Process to Software Engineering Decision Support focused on increasing the Quality of Software Development (S) (EG, RMB), pp. 95–100.
- SAC-2013-RieckerBH #detection #energy #lightweight #network
- Lightweight energy consumption based intrusion detection system for wireless sensor networks (MR, SB, MH), pp. 1784–1791.
- LCTES-2013-MorenoFH #analysis #debugging #embedded
- Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis (CM, SF, MAH), pp. 77–88.
- SOSP-2013-ChandraKZ #web #web service
- Asynchronous intrusion recovery for interconnected web services (RC, TK, NZ), pp. 213–227.
- DAC-2012-HuangLWT #interface
- A non-intrusive timing synchronization interface for hardware-assisted HW/SW co-simulation (YHH, YSL, HIW, RST), pp. 127–132.
- DATE-2012-AbdallahSMA #testing
- Testing RF circuits with true non-intrusive built-in sensors (LA, HGDS, SM, JA), pp. 1090–1095.
- KDD-2012-DingKBKC #anti #communication #detection #social
- Intrusion as (anti)social communication: characterization and detection (QD, NK, PB, EDK, MC), pp. 886–894.
- KDIR-2012-LemnaruTCP #case study #classification #detection #hybrid #network #problem
- A Hybrid Solution for Imbalanced Classification Problems — Case Study on Network Intrusion Detection (CL, ATV, AC, RP), pp. 348–352.
- MLDM-2012-SyarifZPW #detection
- Application of Bagging, Boosting and Stacking to Intrusion Detection (IS, EZ, APB, GW), pp. 593–602.
- SAC-2012-InzingerSHLD #adaptation #optimisation #policy
- Non-intrusive policy optimization for dependable and adaptive service-oriented systems (CI, BS, WH, PL, SD), pp. 504–510.
- SAC-2012-MoraisC #ad hoc #detection #distributed #network
- A distributed intrusion detection scheme for wireless ad hoc networks (ANPM, ARC), pp. 556–562.
- PADL-2011-SalgueiroDBA #constraints #detection #using
- Using Constraints for Intrusion Detection: The NeMODe System (PDS, DD, IB, SA), pp. 115–129.
- SOSP-2011-ChandraKSNZ #web
- Intrusion recovery for database-backed web applications (RC, TK, MS, NN, NZ), pp. 101–114.
- DATE-2010-BolteSBNB #using
- Non-intrusive virtualization management using libvirt (MB, MS, GB, ON, AB), pp. 574–579.
- DATE-2010-WenCCL #debugging #named #parallel #runtime #source code
- RunAssert: A non-intrusive run-time assertion for parallel programs debugging (CNW, SHC, TFC, TJL), pp. 287–290.
- ICPR-2010-MalakutiA #monitoring #towards
- Towards an Intelligent Bed Sensor: Non-intrusive Monitoring of Sleep Irregularities with Computer Vision Techniques (KM, ABA), pp. 4004–4007.
- ICPR-2010-NguyenFP #detection #towards
- Towards a Generic Feature-Selection Measure for Intrusion Detection (HTN, KF, SP), pp. 1529–1532.
- SEKE-2010-ShinPS #detection
- Detection of Malicious Software Engineer Intrusion (MES, NP, SS), pp. 565–570.
- OSDI-2010-KimWZK #using
- Intrusion Recovery Using Selective Re-execution (TK, XW, NZ, MFK), pp. 89–104.
- DAC-2009-ShankarL #multi #profiling
- Non-intrusive dynamic application profiling for multitasked applications (KS, RLL), pp. 130–135.
- DAC-2009-WalravensVD #analysis #modelling #named #performance
- ActivaSC: a highly efficient and non-intrusive extension for activity-based analysis of SystemC models (CW, YV, WD), pp. 172–177.
- DAC-2009-WenCCS #architecture #concurrent #debugging #detection #manycore #named
- NUDA: a non-uniform debugging architecture and non-intrusive race detection for many-core (CNW, SHC, TFC, APS), pp. 148–153.
- DHM-2009-ThomasDAS #evaluation #personalisation
- Non-intrusive Personalized Mental Workload Evaluation for Exercise Intensity Measure (NLT, YD, TA, JHS), pp. 315–322.
- HIMI-II-2009-KushiroKNI #behaviour #health #monitoring
- Non-intrusive Human Behavior Monitoring Sensor for Health Care System (NK, MK, MN, YI), pp. 549–558.
- SAC-2009-MaoLPCH #approach #detection #learning #multi
- Semi-supervised co-training and active learning based approach for multi-view intrusion detection (CHM, HML, DP, TC, SYH), pp. 2042–2048.
- DATE-2008-ChoudhuryM #approximate #concurrent #detection #fault #logic
- Approximate logic circuits for low overhead, non-intrusive concurrent error detection (MRC, KM), pp. 903–908.
- DATE-2008-DasMJZMC #analysis #component #detection #implementation #network #performance
- An Efficient FPGA Implementation of Principle Component Analysis based Network Intrusion Detection System (AD, SM, SJ, JZ, GM, ANC), pp. 1160–1165.
- ICEIS-HCI-2008-LucaB #design #implementation #navigation #recommendation
- Microformats Based Navigation Assistant — A Non-intrusive Recommender Agent: Design and Implementation (APL, SCB), pp. 54–61.
- ICPR-2008-YangQ #analysis #component #detection #independence #network #using
- A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
- SEKE-2008-CemerlicYK #detection #network
- Network Intrusion Detection Based on Bayesian Networks (AC, LY, JMK), pp. 791–794.
- SAC-2008-KuangZ #algorithm #detection #using
- An anomaly intrusion detection method using the CSI-KNN algorithm (LK, MZ), pp. 921–926.
- SAC-2008-LoTP #detection #hardware #implementation #network #regular expression
- Hardware implementation for network intrusion detection rules with regular expression support (CTDL, YGT, KP), pp. 1535–1539.
- SAC-2008-SpinosaCG #clustering #concept #data type #detection #network #novel
- Cluster-based novel concept detection in data streams applied to intrusion detection in computer networks (EJS, ACPLFdC, JG), pp. 976–980.
- CASE-2007-FagioliniVPDB #detection #distributed #implementation #monitoring #multi
- Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi-Agent Systems (AF, GV, LP, GD, AB), pp. 454–459.
- DATE-2007-SinanogluP #approach
- A non-intrusive isolation approach for soft cores (OS, TP), pp. 27–32.
- CHI-2007-ThompsonRYB #detection #interface #visual notation
- Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection (RST, EMR, WY, BPB), p. 1205.
- HCI-AS-2007-McCoyEPG #online
- Online Ad Intrusiveness (SM, AE, PP, DFG), pp. 86–89.
- ICEIS-HCI-2007-MelguizoBDBB #memory management #recommendation #what
- What a Proactive Recommendation System Needs — Relevance, Non-Intrusiveness, and a New Long-Term Memory (MCPM, TB, AD, LB, AvdB), pp. 86–91.
- MLDM-2007-MicarelliS #approach #detection
- A Case-Based Approach to Anomaly Intrusion Detection (AM, GS), pp. 434–448.
- MLDM-2007-SadoddinG #case study #comparative #data mining #detection #machine learning #mining
- A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection (RS, AAG), pp. 404–418.
- SEKE-2007-KanaskarSR #analysis #approach #detection #using
- A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
- MoDELS-2007-MassicotteCBL #detection #modelling
- Model-Driven, Network-Context Sensitive Intrusion Detection (FM, MC, LCB, YL), pp. 61–75.
- MoDELS-2007-MassicotteCBL #detection #modelling
- Model-Driven, Network-Context Sensitive Intrusion Detection (FM, MC, LCB, YL), pp. 61–75.
- SAC-2007-MeddebDB #detection
- Global intrusion detection and tolerance in networked systems (AM, YD, NB), pp. 188–189.
- SAC-2007-SoleimaniADDBA #detection #named #reliability
- RAAS: a reliable analyzer and archiver for snort intrusion detection system (MS, EKA, MD, MD, AB, MA), pp. 259–263.
- SAC-2007-YiKOJKD #detection #hardware #performance
- Memory-efficient content filtering hardware for high-speed intrusion detection systems (SY, BKK, JO, JJ, GK, CRD), pp. 264–269.
- PPoPP-2007-SchuffCP #detection #network #parallel
- Conservative vs. optimistic parallelization of stateful network intrusion detection (DLS, YRC, VSP), pp. 138–139.
- CSMR-2006-Boffoli #monitoring #quality
- Non-Intrusive Monitoring of Software Quality (NB), pp. 319–322.
- SEKE-2006-SornilS #detection #using
- Improving Intrusion Detection Systems Using Reference Vectors (OS, PS), pp. 398–403.
- ASE-2005-Kemmerer #design #detection #implementation #product line
- Designing and implementing a family of intrusion detection systems (RAK), p. 3.
- HT-2005-BlusteinFS #detection #visualisation
- Information visualization for an intrusion detection system (JB, CLF, DLS), pp. 278–279.
- ITiCSE-2005-TobinW #education #security #using
- Using a windows attack intRusion emulator (AWARE) to teach computer security awareness (DLTJ, MSW), pp. 213–217.
- AdaEurope-2005-LundqvistSG #fault tolerance
- Non-intrusive System Level Fault-Tolerance (KL, JS, SG), pp. 156–166.
- ICEIS-v2-2005-Diaz-GomezH #algorithm #detection #search-based #using
- Improved Off-Line Intrusion Detection Using a Genetic Algorithm (PADG, DFH), pp. 66–73.
- ICEIS-v2-2005-ZengG #detection #integration
- Agent-Based Intrusion Detection System for Integration (JZ, DG), pp. 176–181.
- ICEIS-v4-2005-YiZZ #ad hoc #architecture #detection #mobile #network #using
- An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks (PY, SZ, YZ), pp. 220–226.
- MLDM-2005-GiacintoPR #clustering #detection #network
- Alarm Clustering for Intrusion Detection Systems in Computer Networks (GG, RP, FR), pp. 184–193.
- MLDM-2005-Sy #approach #detection
- Signature-Based Approach for Intrusion Detection (BKS), pp. 526–536.
- SAC-2005-DuanHW #detection #network
- Enhancing network intrusion detection systems with interval methods (QD, CH, HCW), pp. 1444–1448.
- SAC-2005-HouD #analysis #design #detection #search-based
- Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA’s genetic arms race (HH, GVD), pp. 952–956.
- CGO-2005-ZhangZP
- Building Intrusion-Tolerant Secure Software (TZ, XZ, SP), pp. 255–266.
- SOSP-2005-GoelPFLL
- The taser intrusion recovery system (AG, KP, KF, ZL, EdL), pp. 163–176.
- SOSP-2005-JoshiKDC #detection
- Detecting past and present intrusions through vulnerability-specific predicates (AJ, STK, GWD, PMC), pp. 91–104.
- CAV-2005-OlivainG #detection
- The Orchids Intrusion Detection Tool (JO, JGL), pp. 286–290.
- CSMR-2004-Torchiano #approach #comprehension #empirical #modelling
- Empirical Investigation of a Non-Intrusive Approach to Study Comprehension Cognitive Models (MT), pp. 184–194.
- CSCW-2004-GoodallLK #collaboration #detection #network
- I know my network: collaboration and expertise in intrusion detection (JRG, WGL, AK), pp. 342–345.
- ICEIS-v3-2004-MukkamalaSAR #adaptation #detection #using
- Intrusion Detection Systems Using Adaptive Regression Splines (SM, AHS, AA, VR), pp. 26–33.
- SAC-2004-AmorBE #detection #naive bayes
- Naive Bayes vs decision trees in intrusion detection systems (NBA, SB, ZE), pp. 420–424.
- SAC-2004-HuP #approach #data mining #database #detection #mining
- A data mining approach for database intrusion detection (YH, BP), pp. 711–716.
- SAC-2004-Wang
- The loop fallacy and serialization in tracing intrusion connections through stepping stones (XW), pp. 404–411.
- SAC-2004-ZaneroS #detection #learning
- Unsupervised learning techniques for an intrusion detection system (SZ, SMS), pp. 412–419.
- DATE-2003-DrineasM #concurrent #detection #fault #monitoring
- Non-Intrusive Concurrent Error Detection in FSMs through State/Output Compaction and Monitoring via Parity Trees (PD, YM), pp. 11164–11167.
- VLDB-2003-HulgeriS #cost analysis #named #optimisation #parametricity #query
- AniPQO: Almost Non-intrusive Parametric Query Optimization for Nonlinear Cost Functions (AH, SS), pp. 766–777.
- ICEIS-v3-2003-HoangHB #data mining #detection #mining
- Intrusion Detection Based on Data Mining (XDH, JH, PB), pp. 341–346.
- KDD-2003-OteyPGLNP #detection #towards
- Towards NIC-based intrusion detection (MEO, SP, AG, GL, SN, DKP), pp. 723–728.
- SAC-2003-BarbaraLLJC #data mining #detection #mining
- Bootstrapping a Data Mining Intrusion Detection System (DB, YL, JLL, SJ, JC), pp. 421–425.
- ESEC-FSE-2003-VignaVK #design #detection #implementation #product line
- Designing and implementing a family of intrusion detection systems (GV, FV, RAK), pp. 88–97.
- ICSE-2003-KemmererV #detection #internet #security
- Internet Security and Intrusion Detection (RAK, GV), pp. 748–749.
- SOSP-2003-KingC #backtracking
- Backtracking intrusions (STK, PMC), pp. 223–236.
- ICEIS-2002-LowLT #database #detection #named #transaction
- DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions (WLL, JL, PT), pp. 121–128.
- ICPR-v2-2002-GiacintoR #classification #detection #multi #network
- Intrusion Detection in Computer Networks by Multiple Classifier Systems (GG, FR), pp. 390–393.
- ICPR-v4-2002-YeungC #detection #network
- Parzen-Window Network Intrusion Detectors (DYY, CC), pp. 385–388.
- KDD-2002-JulischD #detection #mining
- Mining intrusion detection alarms for actionable knowledge (KJ, MD), pp. 366–375.
- KDD-2002-SequeiraZ #data mining #mining #named
- ADMIT: anomaly-based data mining for intrusions (KS, MJZ), pp. 386–395.
- SAC-2002-KrugelTK #detection #network
- Service specific anomaly detection for network intrusion detection (CK, TT, EK), pp. 201–208.
- SAC-2002-SeleznyovM #detection #learning
- Learning temporal patterns for anomaly intrusion detection (AS, OM), pp. 209–213.
- OSDI-2002-DunlapKCBC #analysis #named
- ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay (GWD, STK, SC, MAB, PMC), pp. 211–224.
- TOOLS-EUROPE-2000-SridharanMM #corba #distributed #monitoring #testing
- Non-Intrusive Testing, Monitoring and Control of Distributed CORBA Objects (BS, SM, APM), p. 195–?.
- HPDC-2000-WolskiGT #metric #network
- Synchronizing Network Probes to Avoid Measurement Intrusiveness with the Network Weather Service (RW, BG, BT), pp. 147–154.
- KDD-1999-LeeSM #data flow #detection #experience #mining #network
- Mining in a Data-Flow Environment: Experience in Network Intrusion Detection (WL, SJS, KWM), pp. 114–124.
- KDD-1998-DuMouchelS #algorithm #detection #performance #testing
- A Fast Computer Intrusion Detection Algorithm Based on Hypothesis Testing of Command Transition Probabilities (WD, MS), pp. 189–193.
- KDD-1998-LeeSM #detection #mining #modelling
- Mining Audit Data to Build Intrusion Detection Models (WL, SJS, KWM), pp. 66–72.
- ICSE-1998-ChuangKW #architecture #c++
- Non-Intrusive Object Introspection in C++: Architecture and Application (TRC, YSK, CMW), pp. 312–321.
- EDAC-1994-HarrisO #concurrent #fine-grained #scheduling
- Fine-Grained Concurrency in Test Scheduling for Partial-Intrusion BIST (IGH, AO), pp. 119–123.
- ECHT-1990-IrlerB #hypermedia
- Non-Intrusive Hypertext Anchors and Individual Colour Markings (WJI, GB), pp. 261–273.
- PPEALS-1988-AralG #interactive #profiling
- Non-Intrusive and Interactive Profiling in Parasight (ZA, IG), pp. 21–30.