Your search for 37657 returns 3512 document(s) |
Honeybee-based model to detect intrusion, (LNCS-Lecture Notes in Computer Science 5576) Hal. 598-607 |
Author: Ghassan Ahmed Ali; Aman Jantan; Abdulghani Ali; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A data mining framework for building intrusion detection models based on IPv6, (LNCS-Lecture Notes in Computer Science 5576) Hal 608-618 |
Author: Zenghui Liu; Yingxu Lai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Domain specifict intented use evaluation method: intrusion detection spesific intented use evaluation method, (LNCS-Lecture Notes in Computer Science 5576) Hal 778-787 |
Author: Albert Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Deployment value model for inrusion detection sensors, (LNCS-Lecture Notes in Computer Science 5576) Hal. 250-260 |
Author: Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CRYPTEX model for E-commercial contract of software source code using secrete sharing scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal 662-671 |
Author: ByungRae Cha; Youngil KIM; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Intrusion-resilient signatures: generic constructions, or defeating strong adversary with minimal assumptions, (LNCS-Lecture Notes in Computer Science 2576) Hal 102-118 |
Author: Gene Itkis; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient presentation of multivariate audit data for intrusion detection of web-based internet services, (LNCS-Lecture Notes in Computer Science 2576) Hal 63-75 |
Author: Zhi Guo; Kwok-Yan Lam; Siu-Leung Chung; Ming Gu; Jia-Guang Sun; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A New Notion of Soundness in bare public-key model, (LNCS-Lecture Notes in Computer Science 2576) Hal 318-325 |
Author: Shirley H.C. Cheung; Xiaotie Deng; C.H. Lee; Yunlei Zhao; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An authorization model for e-consent requirement in a health care application, (LNCS-Lecture Notes in Computer Science 2576) Hal 191-205 |
Author: Chun Ruan; Vijay Varadharajan; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementing a hidden markov model speech recognition system in programmable logic, (LNCS-Lecture Notes in Computer Science 2147) Hal 81-90 |
Author: Stephen J. Melnikoff; Steven F.Quigley; Martin J. Russell; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|