Search results for: Salvatore J. Stolfo
Lecture Notes in Computer Science > Information Security Practice and Experience > Secure Architecture I > 97-108
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Anomaly Detection > 142-160
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Intrusion Prevention and Response > 82-101
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Anomaly Detection > 181-200
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Worm Detection and Containment (II) > 227-246
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Malware Detection and Defence > 118-137
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Network Security I > 35-54
Studies in Fuzziness and Soft Computing > Data Mining, Rough Sets and Granular Computing > Data Mining > 166-189
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Sandboxing and Embedded Environments > 358-377
Lecture Notes in Computer Science > Advances in Information and Computer Security > Software Security > 152-166
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Recent Advances in Intrusion Detection Anomaly and Specification-Based Approaches > 41-60
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Anomaly Detection > 203-222