Search results
Lecture Notes in Computer Science > Rough Sets, Fuzzy Sets, Data Mining and Granular Computing > Clustering and Current Trends in Computing > 455-462
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Intrusion Avoidance and Detection > 18-32
Lecture Notes in Computer Science > Computer Network Security > Intrusion and Malware Detection > 242-255
Lecture Notes in Computer Science > Networking and Mobile Computing > Session 17: Security II > 817-825
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Anomaly Detection > 142-160
IFIP — The International Federation for Information Processing > Integrity and Internal Control in Information Systems VI > Refereed papers > 115-124
Lecture Notes in Computer Science > Advances in Neural Networks – ISNN 2009 > Fuzzy Systems and Fuzzy Neural Networks > 208-217
Lecture Notes in Computer Science > Knowledge Science, Engineering and Management > Regular Papers > 160-170
Lecture Notes in Computer Science > Computational Science – ICCS 2006 > Applications of Computing as a Scientific Paradigm > 419-426
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Obfuscated Code Detection > 19-31
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Intrusion Detection Analysis > 307-326
Lecture Notes in Computer Science > Advances in Data Mining. Applications and Theoretical Aspects > Aspects of Data Mining > 595-605
Lecture Notes in Computer Science > Ad-Hoc, Mobile, and Wireless Networks > Routing in Sensor Networks > 19-31
Lecture Notes in Computer Science > Challenges for Next Generation Network Operations and Service Management > Session 10: Security Management > 399-408
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Network-Based Intrusion Detection > 265-283
Lecture Notes in Computer Science > Algorithms and Architectures for Parallel Processing > ICA3PP 2011 Regular Papers > 218-229
IFIP — The International Federation for Information Processing > Security and Protection in Information Processing Systems > 209-224