Search Result Save to File Save as CSV
Your search for 38149 returns 6458 document(s)
A data mining framework for building intrusion detection models based on IPv6, (LNCS-Lecture Notes in Computer Science 5576) Hal 608-618
Author: Zenghui Liu; Yingxu Lai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient presentation of multivariate audit data for intrusion detection of web-based internet services, (LNCS-Lecture Notes in Computer Science 2576) Hal 63-75
Author: Zhi Guo; Kwok-Yan Lam; Siu-Leung Chung; Ming Gu; Jia-Guang Sun; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Honeybee-based model to detect intrusion, (LNCS-Lecture Notes in Computer Science 5576) Hal. 598-607
Author: Ghassan Ahmed Ali; Aman Jantan; Abdulghani Ali; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Domain specifict intented use evaluation method: intrusion detection spesific intented use evaluation method, (LNCS-Lecture Notes in Computer Science 5576) Hal 778-787
Author: Albert Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Trust based intrusion detection scheme for secure data transfer, HAL. 651-658
Author: Shabana Mehfuz and M.N. Doja; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient presentation of multivariate audit data for intusion detection of web-based internet services, (LNCS-Lecture Notes in Computer Science 2846) Hal. 63-75
Author: Zhi Guo; Kwok-Yan Lam; Siu-Leung Chung; Ming Gu, and Jia Guang Sun; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Implementation of parallel BACON-MVV method based on data decomposition in intrusion detection system, Hal. 85-90
Author: Lely Hiryanto; Andri Muliawan, Dyah Erny Herwindiati; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Intrusion Detection Systems and Multisensor Data Fusion
Author: Tim Bass | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Attention : attackER traceback using MAC layer abnormalilty detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 239-249
Author: Yongjin Kim; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Deployment value model for inrusion detection sensors, (LNCS-Lecture Notes in Computer Science 5576) Hal. 250-260
Author: Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next