-
1
-
-
0038503115
-
Counteracting network distributed attacks: An intelligent approach to minimise the TCP/IP protocol threats using agents technology
-
Stafford
-
Abouzakhar, N., Gani, A. and Manson, G. (2002), "Counteracting network distributed attacks: an intelligent approach to minimise the TCP/IP protocol threats using agents technology", paper presented at Communication Systems, Networks and Digital Signal Processing (CSNDSP 2002), 3rd International Symposium, Stafford.
-
(2002)
Communication Systems, Networks and Digital Signal Processing (CSNDSP 2002), 3rd International Symposium
-
-
Abouzakhar, N.1
Gani, A.2
Manson, G.3
-
2
-
-
0003470291
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
Altrock, C.V. (1995), Fuzzy Logic & NeuroFuzzy Applications Explained: The Practical, Hands-on Guide to Building Fuzzy Logic Applications, Prentice-Hall, Englewood Cliffs, NJ.
-
(1995)
Fuzzy Logic & NeuroFuzzy Applications Explained: The Practical, Hands-on Guide to Building Fuzzy Logic Applications
-
-
Altrock, C.V.1
-
4
-
-
0003753097
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
Jang, J.S.R., Sun, C.T. and Mizutani, E. (1997), Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence, Prentice-Hall, Englewood Cliffs, NJ.
-
(1997)
Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence
-
-
Jang, J.S.R.1
Sun, C.T.2
Mizutani, E.3
-
5
-
-
0003909358
-
-
John Wiley & Sons, New York, NY
-
Nauck, D., Klawonn, F. and Kruse, R. (1997), Foundations of Neuro-fuzzy Systems, John Wiley & Sons, New York, NY.
-
(1997)
Foundations of Neuro-fuzzy Systems
-
-
Nauck, D.1
Klawonn, F.2
Kruse, R.3
-
6
-
-
0027711242
-
Denial of service
-
ACM, New York, NY
-
Needham, R. (1994), "Denial of service", Proceedings of the 1st ACM Conference on Computer and Communications Security, ACM, New York, NY, pp. 151-3.
-
(1994)
Proceedings of the 1st ACM Conference on Computer and Communications Security
, pp. 151-153
-
-
Needham, R.1
-
7
-
-
0004250162
-
-
New Rider, Indianapolis, IN
-
Northcutt, S., Cooper, M., Fearnow, M. and Frederick, K. (2001), Intrusion Signatures and Analysis, New Rider, Indianapolis, IN.
-
(2001)
Intrusion Signatures and Analysis
-
-
Northcutt, S.1
Cooper, M.2
Fearnow, M.3
Frederick, K.4
-
8
-
-
0036508551
-
2002 CSI/FBI computer crime and security survey
-
Power, R. (2002), "2002 CSI/FBI computer crime and security survey", Computer Security Journal, Vol. XVIII No. 2, pp. 7-30.
-
(2002)
Computer Security Journal
, vol.18
, Issue.2
, pp. 7-30
-
-
Power, R.1
-
9
-
-
0004164013
-
-
John Wiley & Sons, New York, NY
-
Tsoukalas, L.H. and Uhrig, R.E. (1997), Fuzzy and Neural Approaches in Engineering, John Wiley & Sons, New York, NY.
-
(1997)
Fuzzy and Neural Approaches in Engineering
-
-
Tsoukalas, L.H.1
Uhrig, R.E.2
|