Search results
Lecture Notes in Computer Science > Advances in Knowledge Discovery and Data Mining > Outlier and Intrusion Detection > 611-620
Lecture Notes in Computer Science > Hybrid Artificial Intelligence Systems > Evolutionary Computation > 132-139
Lecture Notes in Computer Science > Managing Next Generation Networks and Services > Session 8: Network Security Management II > 344-353
Lecture Notes in Computer Science > Applications of Evolutionary Computing > EvoCOMNET Contributions > 1-10
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Anomaly Detection I > 36-54
Lecture Notes in Computer Science > Agent and Multi-Agent Systems: Technologies and Applications > Special Session: Self-organization in Multi-agent Systems > 842-849
Lecture Notes in Computer Science > Computational and Ambient Intelligence > Other Applications > 1138-1146
Lecture Notes in Computer Science > Networking and Mobile Computing > Session 26: Agent-Based Algorithms > 1227-1233
Lecture Notes in Computer Science > Distributed Computing and Networking > Internet and Security > 393-400
Lecture Notes in Computer Science > Information Security Applications > Intrusion Detection I > 99-113
Information Technology: Transmission, Processing and Storage > Wireless Communications Systems and Networks > 531-557
Lecture Notes in Computer Science > Information Security and Cryptology > Access Control and Network Security > 348-369
Lecture Notes in Computer Science > Advances in Computation and Intelligence > Section V: Robust Classification > 297-308
Lecture Notes in Computer Science > Computer Network Security > Intrusion and Malware Detection > 217-228
Lecture Notes in Computer Science > Neural Information Processing > Neural Networks for Data Mining > 777-785
IFIP — The International Federation for Information Processing > Information Security Management, Education and Privacy > 10th IFIP WG 11.1 Annual Working Conference on Information Security Management > 51-65