|
Search the dblp DataBase
Maria Papadaki:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Maria Papadaki, Steven Furnell, Benn Lines, Paul L. Reynolds
Operational Characteristics of an Automated Intrusion Response System. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2003, pp:65-75 [Conf]
- Steven Furnell, Maria Papadaki, G. Magklaras, A. Alayed
Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks. [Citation Graph (0, 0)][DBLP] Conference on Information Security Management & Small Systems Security, 2001, pp:87-98 [Conf]
- Paul Dowland, Steven Furnell, Maria Papadaki
Keystroke Analysis as a Method of Advanced User Authentication and Response. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:215-226 [Conf]
- I. Irakleous, Steven Furnell, Paul Dowland, Maria Papadaki
An experimental comparison of secret-based user authentication technologies. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2002, v:10, n:3, pp:100-108 [Journal]
- Jörg Preuß, Steven Furnell, Maria Papadaki
Considering the potential of criminal profiling to combat hacking. [Citation Graph (0, 0)][DBLP] Journal in Computer Virology, 2007, v:3, n:2, pp:135-141 [Journal]
Investigating the problem of IDS false alarms: An experimental study using Snort. [Citation Graph (, )][DBLP]
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. [Citation Graph (, )][DBLP]
Assessing the Usability of End-User Security Software. [Citation Graph (, )][DBLP]
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. [Citation Graph (, )][DBLP]
Search in 0.021secs, Finished in 0.021secs
|