Security and fraud detection in mobile and wireless networks
Handbook of wireless networks and mobile computing
Panoptis: intrusion detection using a domain-specific language
Journal of Computer Security
From Declarative Signatures to Misuse IDS
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Formal Specification of Intrusion Signatures and Detection Rules
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Elaborating Security Requirements by Construction of Intentional Anti-Models
Proceedings of the 26th International Conference on Software Engineering
The Kerf Toolkit for Intrusion Analysis
IEEE Security and Privacy
An new intrusion detection method based on linear prediction
InfoSecu '04 Proceedings of the 3rd international conference on Information security
NetHost-sensor: Monitoring a target host's application via system calls
Information Security Tech. Report
Detecting malicious java code using virtual machine auditing
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
International Journal of Information and Computer Security
A real-time intrusion prevention system for commercial enterprise databases and file systems
AIKED'05 Proceedings of the 4th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering Data Bases
A real-time intrusion prevention system for commercial enterprise databases
SEPADS'05 Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems
A real-time intrusion prevention system for commercial enterprise databases and file systems
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
Formalisation of C Language Interfaces
Electronic Notes in Theoretical Computer Science (ENTCS)
Modeling Agents' Knowledge in Collective Evolutionary Systems
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part I
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
Computer Communications
The use of artificial intelligence based techniques for intrusion detection: a review
Artificial Intelligence Review
Scalable analysis of attack scenarios
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
An efficient and unified approach to correlating, hypothesizing, and predicting intrusion alerts
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
A proposed model for data warehouse user behaviour using intrusion detection system
ACM SIGSOFT Software Engineering Notes
Hi-index | 0.00 |