Learning in the presence of concept drift and hidden contexts
Machine Learning
Masquerade Detection Using Truncated Command Lines
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Machine learning techniques for the computer security domain of anomaly detection
Machine learning techniques for the computer security domain of anomaly detection
Intrusion Detection: A Bioinformatics Approach
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
LIBSVM: A library for support vector machines
ACM Transactions on Intelligent Systems and Technology (TIST)
Hi-index | 0.00 |
Non-repudiation service is crucial to electronic commerce. We have made some research of ATL logic method and its applications in multi-party security protocols formalized analysis. A typical multi-party non-repudiation protocol is modeled and analyzed ...