On pseudonymization of audit data for intrusion detection
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Using Text Categorization Techniques for Intrusion Detection
Proceedings of the 11th USENIX Security Symposium
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
A middleware architecture for privacy protection
Computer Networks: The International Journal of Computer and Telecommunications Networking
Data base support for intrusion detection with honeynets
TELE-INFO'07 Proceedings of the 6th WSEAS Int. Conference on Telecommunications and Informatics
DSS for computer security incident response applying CBR and collaborative response
Expert Systems with Applications: An International Journal
An efficient network intrusion detection
Computer Communications
Random effects logistic regression model for anomaly detection
Expert Systems with Applications: An International Journal
Managing university internet access: balancing the need for security, privacy and digital evidence
Journal in Computer Virology
Fraud detection for voice over IP services on next-generation networks
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Authorization architectures for privacy-respecting surveillance
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |