Search results for: Roberto Perdisci
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 5 > 535 - 549
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Network Protection > 18-37
Lecture Notes in Computer Science > Image Analysis and Processing – ICIAP 2005 > Pattern Recognition for Computer Network Security > 58-65
Lecture Notes in Computer Science > Machine Learning and Data Mining in Pattern Recognition > Applications of Clustering > 184-193
Lecture Notes in Computer Science > Machine Learning and Data Mining in Pattern Recognition > Intrusion Detection and Networks > 449-463
Journal of Information Security and Applications > 2014 > 19 > 3 > 194-208
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 1 > 27 - 38
Computer Networks > 2013 > 57 > 2 > 487-500
IEEE Transactions on Dependable and Secure Computing > 2012 > 9 > 5 > 714 - 726
Computer Networks > 2009 > 53 > 6 > 864-881
Pattern Recognition Letters > 2008 > 29 > 14 > 1941-1946
Information Fusion > 2008 > 9 > 1 > 69-82
Engineering Applications of Artificial Intelligence > 2006 > 19 > 4 > 429-438