Search results for: Issa Traore
Tropical Medicine & International Health > 23 > 10 > 1084 - 1091
International Journal of Communication Systems > 30 > 12 > n/a - n/a
Computational Intelligence > 32 > 2 > 216 - 239
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Anomaly Detection > 160-173
Lecture Notes in Computer Science > Rule Interchange and Applications > General Rule Topics > 108-121
Lecture Notes in Computer Science > Information Networking. Convergence in Broadband and Mobile Networking > Security I > 62-71
Lecture Notes in Computer Science > Advances in Computation and Intelligence > Section VIII: Evolutionary Data Mining and Knowledge Discovery > 537-545
Lecture Notes in Computer Science > Cryptology and Network Security > Intrusion Detection and Viruses > 96-109
Lecture Notes in Computer Science > Formal Approaches to Agent-Based Systems > Poster Presentations > 292-293
Journal of Computer and System Sciences > 2015 > 81 > 8 > 1429-1440
Computers & Security > 2015 > 48 > C > 212-233