IEEE Transactions on Software Engineering - Special issue on computer security and privacy
The internet worm program: an analysis
ACM SIGCOMM Computer Communication Review
Security audit trail analysis using inductively generated predictive rules
Proceedings of the sixth conference on Artificial intelligence applications
A survey of intrusion detection techniques
Computers and Security
Classification and detection of computer intrusions
Classification and detection of computer intrusions
Operating system enhancements to prevent the misuse of system calls
Proceedings of the 7th ACM conference on Computer and communications security
A methodology to detect temporal regularities in user behavior for anomaly detection
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Data Mining and Knowledge Discovery
Intrusion Detection Based on the Immune Human System
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Remote Messaging Mechanism Supporting Agent Mobility Based on CORBA
PRIMA '99 Proceedings of the Second Pacific Rim International Workshop on Multi-Agents: Approaches to Intelligent Agents
Design of the Decision Support System for Network Security Management to Secure Enterprise Network
ISC '01 Proceedings of the 4th International Conference on Information Security
Feature selection of intrusion detection data using a hybrid genetic algorithm/KNN approach
Design and application of hybrid intelligent systems
Attack resistant cache replacement for survivable services
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
To identify suspicious activity in anomaly detection based on soft computing
AIA'06 Proceedings of the 24th IASTED international conference on Artificial intelligence and applications
A dynamic data mining technique for intrusion detection systems
Proceedings of the 43rd annual Southeast regional conference - Volume 2
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Network intrusion detection: Evaluating cluster, discriminant, and logit analysis
Information Sciences: an International Journal
On the performance of a hybrid intrusion detection architecture for voice over IP systems
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Intelligence system approach for computer network security
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Self-protection for distributed component-based applications
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
Secure routing in ad hoc networks and a related intrusion detection problem
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
A fusion of ICA and SVM for detection computer attacks
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Intrusion detection system for securing geographical information system web servers
W2GIS'04 Proceedings of the 4th international conference on Web and Wireless Geographical Information Systems
Efficient algorithms for intrusion detection
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Intrusion detection based on MLP neural networks and k-means algorithm
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
A proposed model for data warehouse user behaviour using intrusion detection system
ACM SIGSOFT Software Engineering Notes
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |