Fast Worm Containment Using Feedback Control
IEEE Transactions on Dependable and Secure Computing
Autonomous decision on intrusion detection with trained BDI agents
Computer Communications
Monitoring SIP Traffic Using Support Vector Machines
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Hybrid Intrusion Forecasting Framework for Early Warning System
IEICE - Transactions on Information and Systems
RAP: protecting commodity wi-fi networks from rogue access points
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
When a decision tree learner has plenty of time
AAAI'06 proceedings of the 21st national conference on Artificial intelligence - Volume 2
A hybrid fraud scoring and spike detection technique in streaming data
Intelligent Data Analysis
ICONIP'10 Proceedings of the 17th international conference on Neural information processing: models and applications - Volume Part II
Risk-neutral evaluation of information security investment on data centers
Journal of Intelligent Information Systems
ZDVUE: prioritization of javascript attacks to discover new vulnerabilities
Proceedings of the 4th ACM workshop on Security and artificial intelligence
Effectiveness evaluation of data mining based IDS
ICDM'06 Proceedings of the 6th Industrial Conference on Data Mining conference on Advances in Data Mining: applications in Medicine, Web Mining, Marketing, Image and Signal Mining
A probabilistic diffusion scheme for anomaly detection on smartphones
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Evasion attack of multi-class linear classifiers
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Hi-index | 0.00 |