An Application of Machine Learning to Network Intrusion Detection
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Methods and Limitations of Security Policy Reconciliation
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
"Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Building Maintainable COTS Based Systems
ICSM '98 Proceedings of the International Conference on Software Maintenance
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Security in an autonomic computing environment
IBM Systems Journal
Fixed- vs. variable-length patterns for detecting suspicious process behavior
Journal of Computer Security
COTS diversity based intrusion detection and application to web servers
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Anomaly detection in wireless sensor networks: A survey
Journal of Network and Computer Applications
VESPA: multi-layered self-protection for cloud resources
Proceedings of the 9th international conference on Autonomic computing
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |