Search results
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Anomaly Detection > 63-81
Lecture Notes in Computer Science > Web Information Systems and Mining > Information Security > 271-282
Lecture Notes in Computer Science > Developments in Applied Artificial Intelligence > Knowledge Based System > 385-390
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2004 > Approaches or Methods of Security Engineering Workshop > 547-556
Lecture Notes in Computer Science > Rough Sets and Knowledge Technology > Machine Learning and KDD > 538-543
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Attack and Alert Analysis > 146-165
Lecture Notes in Computer Science > Convergence and Hybrid Information Technology > Security Systems > 445-455
Studies in Computational Intelligence > Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing > 39-48
IFIP — The International Federation for Information Processing > Integrity and Internal Control in Information Systems VI > Refereed papers > 1-11
Lecture Notes in Computer Science > Advances in Computation and Intelligence > Section VII: Swarm Intelligence > 476-486
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Emulation-Based Detection > 68-87
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Attack and Alert Analysis > 102-124
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Host-Based Intrusion Detection > 1-20
Studies in Computational Intelligence > Advances in Knowledge Discovery and Management > Security and Data Streaming > 235-247
Lecture Notes in Computer Science > AI 2006: Advances in Artificial Intelligence > PART II: Regular Papers (5–7 Pages) > 1059-1063