Intrusion and intrusion detection
From MaRDI portal
Publication:4707239
Recommendations
Cited in
(29)- scientific article; zbMATH DE number 1776896 (Why is no real title available?)
- Computer intrusion: Detecting masquerades.
- Intrusion detection system with hybrid detector
- On a probabilistic model of intrusion detection
- Computer Aided Verification
- scientific article; zbMATH DE number 1979434 (Why is no real title available?)
- scientific article; zbMATH DE number 1979441 (Why is no real title available?)
- scientific article; zbMATH DE number 1980968 (Why is no real title available?)
- scientific article; zbMATH DE number 1941225 (Why is no real title available?)
- A decisional framework system for computer network intrusion detection
- Using data-independence in the analysis of intrusion detection systems
- Intrusion detections in collaborative organizations by preserving privacy
- Classification trees as a technique for creating anomaly-based intrusion detection systems
- Multiresolution anomaly detection method for fractional Gaussian noise
- Intrusion detection and correlation. Challenges and solutions
- scientific article; zbMATH DE number 2080964 (Why is no real title available?)
- scientific article; zbMATH DE number 2080972 (Why is no real title available?)
- A hybrid intrusion detection system design for computer network security
- scientific article; zbMATH DE number 1952744 (Why is no real title available?)
- scientific article; zbMATH DE number 2080962 (Why is no real title available?)
- VisRAID: visualizing remote access for intrusion detection
- A pattern recognition algorithm applied in intrusion detection
- Attack chain detection
- Information Security
- Towards a theory of intrusion detection
- String distances and intrusion detection: Bridging the gap between formal languages and computer security
- Applied Cryptography and Network Security
- scientific article; zbMATH DE number 1650463 (Why is no real title available?)
- scientific article; zbMATH DE number 3793928 (Why is no real title available?)
This page was built for publication: Intrusion and intrusion detection
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4707239)