112 papers:
CHI-2015-GoelZVP #detection #flexibility #gesture #named #using- Tongue-in-Cheek: Using Wireless Signals to Enable Non-Intrusive and Flexible Facial Gestures Detection (MG, CZ, RV, SNP), pp. 255–258.
ICSE-v1-2015-NistorCRL #detection #named #performance #problem- CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes (AN, PCC, CR, SL), pp. 902–912.
ICSE-v1-2015-WhalenPRSG #approach #flexibility #metric- A Flexible and Non-intrusive Approach for Computing Complex Structural Coverage Metrics (MWW, SP, NR, MS, DG), pp. 506–516.
ICST-2015-Haser #integration #testing- Non-Intrusive Documentation-Driven Integration Testing (FH), pp. 1–2.
CASE-2014-LaiTCL #energy #industrial #monitoring #performance- Non-Intrusive Load Monitoring applied in energy efficiency of the smart manufacturing industry: A case of air-conditioner (YHL, IJT, CYC, CFL), pp. 1127–1132.
DAC-2014-AndraudSS- One-Shot Calibration of RF Circuits Based on Non-Intrusive Sensors (MA, HGDS, ES), p. 2.
DATE-2014-AbeleinCEGRGRTUW #architecture #integration- Non-intrusive integration of advanced diagnosis features in automotive E/E-architectures (UA, AC, PE, MG, FR, LRG, TR, JT, DU, HJW), pp. 1–6.
CHI-2014-ZhangGTR #interface- Non-intrusive tongue machine interface (QZ, SG, BT, RPNR), pp. 2555–2558.
ICPR-2014-RidiGH #bibliography #monitoring #recognition- A Survey on Intrusive Load Monitoring for Appliance Recognition (AR, CG, JH), pp. 3702–3707.
OSDI-2014-ZhaoZLULYS #distributed #named #profiling- lprof: A Non-intrusive Request Flow Profiler for Distributed Systems (XZ, YZ, DL, MFU, YL, DY, MS), pp. 629–644.
CBSE-2013-BurtonS #correctness #data type #mixin #using- Correctness of intrusive data structures using mixins (EB, ES), pp. 53–58.
ECSA-2013-SilvaB #architecture #automation #consistency #named- PANDArch: A Pluggable Automated Non-intrusive Dynamic Architecture Conformance Checker (LdS, DB), pp. 240–248.
QoSA-2013-AgrawalST #multi #quality- A multi-dimensional measure for intrusion: the intrusiveness quality attribute (AA, BS, TVP), pp. 63–68.
DATE-2013-Moy #approach #modelling #parallel #programming- Parallel programming with SystemC for loosely timed models: a non-intrusive approach (MM), pp. 9–14.
HIMI-D-2013-SilvaZGBSV #question- Are the Intrusive Effects of SPAM Probes Present When Operators Differ by Skill Level and Training? (HIS, JZ, TG, VB, TZS, KPLV), pp. 269–275.
MLDM-2013-Suthaharan #big data #classification #network- A Single-Domain, Representation-Learning Model for Big Data Classification of Network Intrusion (SS), pp. 296–310.
SEKE-2013-GomedeB #development #process #quality #re-engineering- A Non-Intrusive Process to Software Engineering Decision Support focused on increasing the Quality of Software Development (S) (EG, RMB), pp. 95–100.
SAC-2013-RieckerBH #detection #energy #lightweight #network- Lightweight energy consumption based intrusion detection system for wireless sensor networks (MR, SB, MH), pp. 1784–1791.
LCTES-2013-MorenoFH #analysis #debugging #embedded- Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis (CM, SF, MAH), pp. 77–88.
SOSP-2013-ChandraKZ #web #web service- Asynchronous intrusion recovery for interconnected web services (RC, TK, NZ), pp. 213–227.
DAC-2012-HuangLWT #interface- A non-intrusive timing synchronization interface for hardware-assisted HW/SW co-simulation (YHH, YSL, HIW, RST), pp. 127–132.
DATE-2012-AbdallahSMA #testing- Testing RF circuits with true non-intrusive built-in sensors (LA, HGDS, SM, JA), pp. 1090–1095.
KDD-2012-DingKBKC #anti #communication #detection #social- Intrusion as (anti)social communication: characterization and detection (QD, NK, PB, EDK, MC), pp. 886–894.
KDIR-2012-LemnaruTCP #case study #classification #detection #hybrid #network #problem- A Hybrid Solution for Imbalanced Classification Problems — Case Study on Network Intrusion Detection (CL, ATV, AC, RP), pp. 348–352.
MLDM-2012-SyarifZPW #detection- Application of Bagging, Boosting and Stacking to Intrusion Detection (IS, EZ, APB, GW), pp. 593–602.
SAC-2012-InzingerSHLD #adaptation #optimisation #policy- Non-intrusive policy optimization for dependable and adaptive service-oriented systems (CI, BS, WH, PL, SD), pp. 504–510.
SAC-2012-MoraisC #ad hoc #detection #distributed #network- A distributed intrusion detection scheme for wireless ad hoc networks (ANPM, ARC), pp. 556–562.
PADL-2011-SalgueiroDBA #constraints #detection #using- Using Constraints for Intrusion Detection: The NeMODe System (PDS, DD, IB, SA), pp. 115–129.
SOSP-2011-ChandraKSNZ #web- Intrusion recovery for database-backed web applications (RC, TK, MS, NN, NZ), pp. 101–114.
DATE-2010-BolteSBNB #using- Non-intrusive virtualization management using libvirt (MB, MS, GB, ON, AB), pp. 574–579.
DATE-2010-WenCCL #debugging #named #parallel #runtime #source code- RunAssert: A non-intrusive run-time assertion for parallel programs debugging (CNW, SHC, TFC, TJL), pp. 287–290.
ICPR-2010-MalakutiA #monitoring #towards- Towards an Intelligent Bed Sensor: Non-intrusive Monitoring of Sleep Irregularities with Computer Vision Techniques (KM, ABA), pp. 4004–4007.
ICPR-2010-NguyenFP #detection #towards- Towards a Generic Feature-Selection Measure for Intrusion Detection (HTN, KF, SP), pp. 1529–1532.
SEKE-2010-ShinPS #detection- Detection of Malicious Software Engineer Intrusion (MES, NP, SS), pp. 565–570.
OSDI-2010-KimWZK #using- Intrusion Recovery Using Selective Re-execution (TK, XW, NZ, MFK), pp. 89–104.
DAC-2009-ShankarL #multi #profiling- Non-intrusive dynamic application profiling for multitasked applications (KS, RLL), pp. 130–135.
DAC-2009-WalravensVD #analysis #modelling #named #performance- ActivaSC: a highly efficient and non-intrusive extension for activity-based analysis of SystemC models (CW, YV, WD), pp. 172–177.
DAC-2009-WenCCS #architecture #concurrent #debugging #detection #manycore #named- NUDA: a non-uniform debugging architecture and non-intrusive race detection for many-core (CNW, SHC, TFC, APS), pp. 148–153.
DHM-2009-ThomasDAS #evaluation #personalisation- Non-intrusive Personalized Mental Workload Evaluation for Exercise Intensity Measure (NLT, YD, TA, JHS), pp. 315–322.
HIMI-II-2009-KushiroKNI #behaviour #health #monitoring- Non-intrusive Human Behavior Monitoring Sensor for Health Care System (NK, MK, MN, YI), pp. 549–558.
SAC-2009-MaoLPCH #approach #detection #learning #multi- Semi-supervised co-training and active learning based approach for multi-view intrusion detection (CHM, HML, DP, TC, SYH), pp. 2042–2048.
DATE-2008-ChoudhuryM #approximate #concurrent #detection #fault #logic- Approximate logic circuits for low overhead, non-intrusive concurrent error detection (MRC, KM), pp. 903–908.
DATE-2008-DasMJZMC #analysis #component #detection #implementation #network #performance- An Efficient FPGA Implementation of Principle Component Analysis based Network Intrusion Detection System (AD, SM, SJ, JZ, GM, ANC), pp. 1160–1165.
ICEIS-HCI-2008-LucaB #design #implementation #navigation #recommendation- Microformats Based Navigation Assistant — A Non-intrusive Recommender Agent: Design and Implementation (APL, SCB), pp. 54–61.
ICPR-2008-YangQ #analysis #component #detection #independence #network #using- A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
SEKE-2008-CemerlicYK #detection #network- Network Intrusion Detection Based on Bayesian Networks (AC, LY, JMK), pp. 791–794.
SAC-2008-KuangZ #algorithm #detection #using- An anomaly intrusion detection method using the CSI-KNN algorithm (LK, MZ), pp. 921–926.
SAC-2008-LoTP #detection #hardware #implementation #network #regular expression- Hardware implementation for network intrusion detection rules with regular expression support (CTDL, YGT, KP), pp. 1535–1539.
SAC-2008-SpinosaCG #clustering #concept #data type #detection #network #novel- Cluster-based novel concept detection in data streams applied to intrusion detection in computer networks (EJS, ACPLFdC, JG), pp. 976–980.
CASE-2007-FagioliniVPDB #detection #distributed #implementation #monitoring #multi- Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi-Agent Systems (AF, GV, LP, GD, AB), pp. 454–459.
DATE-2007-SinanogluP #approach- A non-intrusive isolation approach for soft cores (OS, TP), pp. 27–32.
CHI-2007-ThompsonRYB #detection #interface #visual notation- Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection (RST, EMR, WY, BPB), p. 1205.
HCI-AS-2007-McCoyEPG #online- Online Ad Intrusiveness (SM, AE, PP, DFG), pp. 86–89.
ICEIS-HCI-2007-MelguizoBDBB #memory management #recommendation #what- What a Proactive Recommendation System Needs — Relevance, Non-Intrusiveness, and a New Long-Term Memory (MCPM, TB, AD, LB, AvdB), pp. 86–91.
MLDM-2007-MicarelliS #approach #detection- A Case-Based Approach to Anomaly Intrusion Detection (AM, GS), pp. 434–448.
MLDM-2007-SadoddinG #case study #comparative #data mining #detection #machine learning #mining- A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection (RS, AAG), pp. 404–418.
SEKE-2007-KanaskarSR #analysis #approach #detection #using- A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
MoDELS-2007-MassicotteCBL #detection #modelling- Model-Driven, Network-Context Sensitive Intrusion Detection (FM, MC, LCB, YL), pp. 61–75.
MoDELS-2007-MassicotteCBL #detection #modelling- Model-Driven, Network-Context Sensitive Intrusion Detection (FM, MC, LCB, YL), pp. 61–75.
SAC-2007-MeddebDB #detection- Global intrusion detection and tolerance in networked systems (AM, YD, NB), pp. 188–189.
SAC-2007-SoleimaniADDBA #detection #named #reliability- RAAS: a reliable analyzer and archiver for snort intrusion detection system (MS, EKA, MD, MD, AB, MA), pp. 259–263.
SAC-2007-YiKOJKD #detection #hardware #performance- Memory-efficient content filtering hardware for high-speed intrusion detection systems (SY, BKK, JO, JJ, GK, CRD), pp. 264–269.
PPoPP-2007-SchuffCP #detection #network #parallel- Conservative vs. optimistic parallelization of stateful network intrusion detection (DLS, YRC, VSP), pp. 138–139.
CSMR-2006-Boffoli #monitoring #quality- Non-Intrusive Monitoring of Software Quality (NB), pp. 319–322.
SEKE-2006-SornilS #detection #using- Improving Intrusion Detection Systems Using Reference Vectors (OS, PS), pp. 398–403.
ASE-2005-Kemmerer #design #detection #implementation #product line- Designing and implementing a family of intrusion detection systems (RAK), p. 3.
HT-2005-BlusteinFS #detection #visualisation- Information visualization for an intrusion detection system (JB, CLF, DLS), pp. 278–279.
ITiCSE-2005-TobinW #education #security #using- Using a windows attack intRusion emulator (AWARE) to teach computer security awareness (DLTJ, MSW), pp. 213–217.
AdaEurope-2005-LundqvistSG #fault tolerance- Non-intrusive System Level Fault-Tolerance (KL, JS, SG), pp. 156–166.
ICEIS-v2-2005-Diaz-GomezH #algorithm #detection #search-based #using- Improved Off-Line Intrusion Detection Using a Genetic Algorithm (PADG, DFH), pp. 66–73.
ICEIS-v2-2005-ZengG #detection #integration- Agent-Based Intrusion Detection System for Integration (JZ, DG), pp. 176–181.
ICEIS-v4-2005-YiZZ #ad hoc #architecture #detection #mobile #network #using- An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks (PY, SZ, YZ), pp. 220–226.
MLDM-2005-GiacintoPR #clustering #detection #network- Alarm Clustering for Intrusion Detection Systems in Computer Networks (GG, RP, FR), pp. 184–193.
MLDM-2005-Sy #approach #detection- Signature-Based Approach for Intrusion Detection (BKS), pp. 526–536.
SAC-2005-DuanHW #detection #network- Enhancing network intrusion detection systems with interval methods (QD, CH, HCW), pp. 1444–1448.
SAC-2005-HouD #analysis #design #detection #search-based- Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA’s genetic arms race (HH, GVD), pp. 952–956.
CGO-2005-ZhangZP- Building Intrusion-Tolerant Secure Software (TZ, XZ, SP), pp. 255–266.
SOSP-2005-GoelPFLL- The taser intrusion recovery system (AG, KP, KF, ZL, EdL), pp. 163–176.
SOSP-2005-JoshiKDC #detection- Detecting past and present intrusions through vulnerability-specific predicates (AJ, STK, GWD, PMC), pp. 91–104.
CAV-2005-OlivainG #detection- The Orchids Intrusion Detection Tool (JO, JGL), pp. 286–290.
CSMR-2004-Torchiano #approach #comprehension #empirical #modelling- Empirical Investigation of a Non-Intrusive Approach to Study Comprehension Cognitive Models (MT), pp. 184–194.
CSCW-2004-GoodallLK #collaboration #detection #network- I know my network: collaboration and expertise in intrusion detection (JRG, WGL, AK), pp. 342–345.
ICEIS-v3-2004-MukkamalaSAR #adaptation #detection #using- Intrusion Detection Systems Using Adaptive Regression Splines (SM, AHS, AA, VR), pp. 26–33.
SAC-2004-AmorBE #detection #naive bayes- Naive Bayes vs decision trees in intrusion detection systems (NBA, SB, ZE), pp. 420–424.
SAC-2004-HuP #approach #data mining #database #detection #mining- A data mining approach for database intrusion detection (YH, BP), pp. 711–716.
SAC-2004-Wang- The loop fallacy and serialization in tracing intrusion connections through stepping stones (XW), pp. 404–411.
SAC-2004-ZaneroS #detection #learning- Unsupervised learning techniques for an intrusion detection system (SZ, SMS), pp. 412–419.
DATE-2003-DrineasM #concurrent #detection #fault #monitoring- Non-Intrusive Concurrent Error Detection in FSMs through State/Output Compaction and Monitoring via Parity Trees (PD, YM), pp. 11164–11167.
VLDB-2003-HulgeriS #cost analysis #named #optimisation #parametricity #query- AniPQO: Almost Non-intrusive Parametric Query Optimization for Nonlinear Cost Functions (AH, SS), pp. 766–777.
ICEIS-v3-2003-HoangHB #data mining #detection #mining- Intrusion Detection Based on Data Mining (XDH, JH, PB), pp. 341–346.
KDD-2003-OteyPGLNP #detection #towards- Towards NIC-based intrusion detection (MEO, SP, AG, GL, SN, DKP), pp. 723–728.
SAC-2003-BarbaraLLJC #data mining #detection #mining- Bootstrapping a Data Mining Intrusion Detection System (DB, YL, JLL, SJ, JC), pp. 421–425.
ESEC-FSE-2003-VignaVK #design #detection #implementation #product line- Designing and implementing a family of intrusion detection systems (GV, FV, RAK), pp. 88–97.
ICSE-2003-KemmererV #detection #internet #security- Internet Security and Intrusion Detection (RAK, GV), pp. 748–749.
SOSP-2003-KingC #backtracking- Backtracking intrusions (STK, PMC), pp. 223–236.
ICEIS-2002-LowLT #database #detection #named #transaction- DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions (WLL, JL, PT), pp. 121–128.
ICPR-v2-2002-GiacintoR #classification #detection #multi #network- Intrusion Detection in Computer Networks by Multiple Classifier Systems (GG, FR), pp. 390–393.
ICPR-v4-2002-YeungC #detection #network- Parzen-Window Network Intrusion Detectors (DYY, CC), pp. 385–388.
KDD-2002-JulischD #detection #mining- Mining intrusion detection alarms for actionable knowledge (KJ, MD), pp. 366–375.
KDD-2002-SequeiraZ #data mining #mining #named- ADMIT: anomaly-based data mining for intrusions (KS, MJZ), pp. 386–395.
SAC-2002-KrugelTK #detection #network- Service specific anomaly detection for network intrusion detection (CK, TT, EK), pp. 201–208.
SAC-2002-SeleznyovM #detection #learning- Learning temporal patterns for anomaly intrusion detection (AS, OM), pp. 209–213.
OSDI-2002-DunlapKCBC #analysis #named- ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay (GWD, STK, SC, MAB, PMC), pp. 211–224.
TOOLS-EUROPE-2000-SridharanMM #corba #distributed #monitoring #testing- Non-Intrusive Testing, Monitoring and Control of Distributed CORBA Objects (BS, SM, APM), p. 195–?.
HPDC-2000-WolskiGT #metric #network- Synchronizing Network Probes to Avoid Measurement Intrusiveness with the Network Weather Service (RW, BG, BT), pp. 147–154.
KDD-1999-LeeSM #data flow #detection #experience #mining #network- Mining in a Data-Flow Environment: Experience in Network Intrusion Detection (WL, SJS, KWM), pp. 114–124.
KDD-1998-DuMouchelS #algorithm #detection #performance #testing- A Fast Computer Intrusion Detection Algorithm Based on Hypothesis Testing of Command Transition Probabilities (WD, MS), pp. 189–193.
KDD-1998-LeeSM #detection #mining #modelling- Mining Audit Data to Build Intrusion Detection Models (WL, SJS, KWM), pp. 66–72.
ICSE-1998-ChuangKW #architecture #c++- Non-Intrusive Object Introspection in C++: Architecture and Application (TRC, YSK, CMW), pp. 312–321.
EDAC-1994-HarrisO #concurrent #fine-grained #scheduling- Fine-Grained Concurrency in Test Scheduling for Partial-Intrusion BIST (IGH, AO), pp. 119–123.
ECHT-1990-IrlerB #hypermedia- Non-Intrusive Hypertext Anchors and Individual Colour Markings (WJI, GB), pp. 261–273.
PPEALS-1988-AralG #interactive #profiling- Non-Intrusive and Interactive Profiling in Parasight (ZA, IG), pp. 21–30.