Search Result
Save to File
Your search for
38208
returns
5490
document(s)
Efficient presentation of multivariate audit data for intrusion detection of web-based internet services, (LNCS-Lecture Notes in Computer Science 2576) Hal 63-75
Author: Zhi Guo; Kwok-Yan Lam; Siu-Leung Chung; Ming Gu; Jia-Guang Sun; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Efficient presentation of multivariate audit data for intusion detection of web-based internet services, (LNCS-Lecture Notes in Computer Science 2846) Hal. 63-75
Author: Zhi Guo; Kwok-Yan Lam; Siu-Leung Chung; Ming Gu, and Jia Guang Sun; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
A data mining framework for building intrusion detection models based on IPv6, (LNCS-Lecture Notes in Computer Science 5576) Hal 608-618
Author: Zenghui Liu; Yingxu Lai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Domain specifict intented use evaluation method: intrusion detection spesific intented use evaluation method, (LNCS-Lecture Notes in Computer Science 5576) Hal 778-787
Author: Albert Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Efficient detection of vacuity in ACTL formulas, (LNCS-Lecture Notes in Computer Science 1254) Hal 279-290
Author: Ilan Beer; Shoham Ben-David; Cindy Eisner; Yoav Rodeh; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Intrusion Detection Systems and Multisensor Data Fusion
Author: Tim Bass | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
What can we learn from synchronous data-flow languages? ( invited presentation ) (LNCS-Lecture Notes in Computer Science 1201) Hal 255-258
Author: Paul Caspi; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Efficient re-keying protocols for multicast encryption, (LNCS-Lecture Notes in Computer Science 2576) Hal 119-132
Author: Giovanni Di Crescenzo; Olga Kornievskaia; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
An efficient tree-based group key agreement using bilinear map, (LNCS-Lecture Notes in Computer Science 2576) Hal 357-371
Author: Sangwon Lee; Yongdae Kim; Kwangjo Kim; Dae-Hyun Ryu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Efficient distributed signcryption scheme as group signcryption, (LNCS-Lecture Notes in Computer Science 2576) Hal 403-417
Author: DongJin Kwak; SangJae Moon; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next