A methodology for developing trusted information systems: the security requirements analysis phase
Current security management & Ethical issues of information technology
Use of dimensionality reduction for intrusion detection
ICISS'07 Proceedings of the 3rd international conference on Information systems security
A fast host-based intrusion detection system using rough set theory
Transactions on Rough Sets IV
Hi-index | 0.00 |