An introduction to intrusion detection
Crossroads - Special issue on computer security
Learning temporal patterns for anomaly intrusion detection
Proceedings of the 2002 ACM symposium on Applied computing
Intrusion Detection via System Call Traces
IEEE Software
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Trace anomalies as precursors of field failures: an empirical study
Empirical Software Engineering
Anomaly intrusion detection by clustering transactional audit streams in a host computer
Information Sciences: an International Journal
A sense of self for Unix processes
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
From biological and social network metaphors to coupled bio-social wireless networks
International Journal of Autonomous and Adaptive Communications Systems
Anomaly intrusion detection based on clustering a data stream
ISC'06 Proceedings of the 9th international conference on Information Security
E-NIPS: an event-based network intrusion prediction system
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.00 |