Citation Impact

Citing Papers

State-of-the-art in artificial neural network applications: A survey
2018 Standout
Structured One-Class Classification
2006
Software-Defined Networking: A Comprehensive Survey
2014 Standout
Future Intelligent and Secure Vehicular Network Toward 6G: Machine-Learning Approaches
2019 Standout
A software platform for testing intrusion detection systems
1997
Mitigating denial of service attacks: A tutorial
2005
NetSTAT: A network-based intrusion detection system
1999
The economic cost of publicly announced information security breaches: empirical evidence from the stock market*
2003 Standout
A Survey of SIP Authentication and Key Agreement Schemes
2013 Standout
A taxonomy of DDoS attack and DDoS defense mechanisms
2004 Standout
Deep Learning Approach for Intelligent Intrusion Detection System
2019 Standout
A survey of techniques for internet traffic classification using machine learning
2008 Standout
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
2005 Standout
Internet of things and supply chain management: a literature review
2017 Standout
A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering
2010
Cyber–Physical System Security for the Electric Power Grid
2011 Standout
A data mining framework for building intrusion detection models
2003
Incentive-based modeling and inference of attacker intent, objectives, and strategies
2005
The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods
2009 Standout
Artificial Neural Networks for Misuse Detection
1998
The economics of information security investment
2002 Standout
Vision, applications and future challenges of Internet of Things
2016
Cyber-physical systems and their security issues
2018 Standout
Survey of intrusion detection systems: techniques, datasets and challenges
2019 Standout
Testing Intrusion detection systems
2000 Standout
A Review on Representative Swarm Intelligence Algorithms for Solving Optimization Problems: Applications and Trends
2021 Standout
Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications
2004
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set
2016 Standout
A methodology for testing intrusion detection systems
1996
An overview of anomaly detection techniques: Existing solutions and latest technological trends
2007 Standout
A framework for constructing features and models for intrusion detection systems
2000
Intrusion detection via system call traces
1997
Characterization of defense mechanisms against distributed denial of service attacks
2004
On the features and challenges of security and privacy in distributed internet of things
2013 Standout
Architecture for an Artificial Immune System
2000
Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids
2011
Issues and challenges in securing VoIP
2009
A survey of network anomaly detection techniques
2015 Standout
Towards a taxonomy of intrusion-detection systems
1999
Balancing cooperation and risk in intrusion detection
2000
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
2013 Standout
Anomaly detection
2009 Standout
Information Fusion to Defend Intentional Attack in Internet of Things
2014
Authentication and Supervision: A Survey of User Attitudes
2000
Intrusion and intrusion detection
2001
Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter
2014 Standout
High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning
2016 Standout
Intrusion detection system: A comprehensive review
2012 Standout
Accurate shellcode recognition from network traffic data using artificial neural nets
2015
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
2009
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
2015 Standout
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
2008 Standout
Bro: a system for detecting network intruders in real-time
1999 Standout
Analysis of Dimensionality Reduction Techniques on Big Data
2020 Standout
Anomaly-based network intrusion detection: Techniques, systems and challenges
2008 Standout

Works of L.T. Heberlein being referenced

Towards Detecting Intrusions in a Networked Environment
2017
Network intrusion detection
1994
Rankless by CCL
2026