IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Discrete-time signal processing
Discrete-time signal processing
Introduction to algorithms
Instance-Based Learning Algorithms
Machine Learning
A Nearest Hyperrectangle Learning Method
Machine Learning
C4.5: programs for machine learning
C4.5: programs for machine learning
Learning to recognize promoter sequences in E. coli by modeling uncertainty in the training data
AAAI '94 Proceedings of the twelfth national conference on Artificial intelligence (vol. 1)
Classification and detection of computer intrusions
Classification and detection of computer intrusions
Time-series similarity problems and well-separated geometric sets
SCG '97 Proceedings of the thirteenth annual symposium on Computational geometry
Advances in instance-based learning algorithms
Advances in instance-based learning algorithms
Pattern Recognition and Neural Networks
Pattern Recognition and Neural Networks
The base-rate fallacy and its implications for the difficulty of intrusion detection
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Enhancing profiles for anomaly detection using time granularities
Journal of Computer Security
User Profiling for Intrusion Detection Using Dynamic and Static Behavioral Models
PAKDD '02 Proceedings of the 6th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
Establishing the business value of network security using analytical hierarchy process
Creating business value with information technology
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Anomaly detection of web-based attacks
Proceedings of the 10th ACM conference on Computer and communications security
Coordinated internet attacks: responding to attack complexity
Journal of Computer Security
Web tap: detecting covert web traffic
Proceedings of the 11th ACM conference on Computer and communications security
LAD: Localization Anomaly Detection forWireless Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
A multi-model approach to the detection of web-based attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Real-time data attack isolation for commercial database applications
Journal of Network and Computer Applications
Processing of massive audit data streams for real-time anomaly intrusion detection
Computer Communications
A real-time intrusion prevention system for commercial enterprise databases and file systems
AIKED'05 Proceedings of the 4th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering Data Bases
Frequent pattern mining for kernel trace data
Proceedings of the 2008 ACM symposium on Applied computing
A real-time intrusion prevention system for commercial enterprise databases
SEPADS'05 Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems
A real-time intrusion prevention system for commercial enterprise databases and file systems
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
Fast intrusion detection based on a non-negative matrix factorization model
Journal of Network and Computer Applications
The implementation and evaluation of a recovery system for workflows
Journal of Network and Computer Applications
Creating User Profiles from a Command-Line Interface: A Statistical Approach
UMAP '09 Proceedings of the 17th International Conference on User Modeling, Adaptation, and Personalization: formerly UM and AH
A multi-model approach to the detection of web-based attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
A risk-sensitive intrusion detection model
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Combining trust and risk to reduce the cost of attacks
iTrust'05 Proceedings of the Third international conference on Trust Management
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
A dead-lock free self-healing algorithm for distributed transactional processes
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Episode based masquerade detection
ICISS'05 Proceedings of the First international conference on Information Systems Security
Hi-index | 0.00 |