Search results for: Benjamin Morin
Cancer Cell > 2018 > 33 > 6 > 1033-1047.e5
Lecture Notes in Computer Science > Image Analysis and Processing – ICIAP 2005 > Pattern Recognition for Computer Network Security > 91-98
Lecture Notes in Computer Science > Information and Communications Security > Security Protocols > 403-418
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Modeling Process Behavior > 130-144
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Sandboxing and Embedded Environments > 378-397
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Assessment of Intrusion Detection Systems > 177-198
NATO Science Series II: Mathematics, Physics and Chemistry > Cyberspace Security and Defense: Research Issues > Intrusion Detection > 349-365
Information Security and Cryptography > Towards Hardware-Intrinsic Security > Hardware-based Security Architectures and Applications > 349-366
Bulletin of Mathematical Biology > 2015 > 77 > 2 > 319-338
Current Opinion in Virology > 2013 > 3 > 2 > 103-110
Bulletin of Mathematical Biology > 2013 > 75 > 4 > 565-588
Journal of Computer Virology and Hacking Techniques > 2010 > 6 > 4 > 353-374
Information Fusion > 2009 > 10 > 4 > 285-299
Journal of Computer Virology and Hacking Techniques > 2007 > 3 > 1 > 39-49