-
1
-
-
84942142768
-
An introduction to intrusion detection and assessment: For system and network security management
-
Bace R., An Introduction to Intrusion Detection and Assessment: for System and Network Security Management, ICSA White Paper, (1998)
-
(1998)
ICSA White Paper
-
-
Bace, R.1
-
2
-
-
33745325539
-
Backup and archive services in corporate network
-
Poznan, Poland
-
Blażków R., Gajewski D., Grzech A., Backup and archive services in corporate network., 3rd International Conference on Business Information Systems. BIS '99., Poznan, Poland, (1999) 33-38
-
(1999)
3rd International Conference on Business Information Systems. BIS '99
, pp. 33-38
-
-
Blazków, R.1
Gajewski, D.2
Grzech, A.3
-
3
-
-
33745303076
-
An adaptive intrusion detection system using neural networks
-
Chapman & Hall, Vienna, Austria
-
Bonifacio Jr., Cansian, A., Moreira E., and de Carvalho A., An Adaptive Intrusion Detection System Using Neural Networks. Proceedings of the IFIP World ComputerCongress-Security in Information Systems, IFIP-SEC'98, Chapman & Hall, Vienna, Austria, (1998)
-
(1998)
Proceedings of the IFIP World ComputerCongress-security in Information Systems, IFIP-SEC'98
-
-
Bonifacio, Jr.1
Cansian, A.2
Moreira, E.3
De Carvalho, A.4
-
4
-
-
74949104861
-
Applying genetic programming to intrusion detection
-
Cambridge, Menlo Park, CA, AAAI Press
-
Crosbie, M., Spafford G.: Applying Genetic Programming to Intrusion Detection. IniProceedings of the AAAI Fall Symposium on Genetic Programming. Cambridge, Menlo Park, CA, AAAI Press (1995)
-
(1995)
Proceedings of the AAAI Fall Symposium on Genetic Programming
-
-
Crosbie, M.1
Spafford, G.2
-
5
-
-
0004135984
-
IDIOT users guide
-
The COAST Project, Dept of Computer Science, Purdue University, West Lafay-ette
-
Crosbie M, Dole B, Ellis T, Krsul I, Spaord E., IDIOT users guide. Technical Report TR-96-050, The COAST Project, Dept of Computer Science, Purdue University, West Lafay-ette, (1996)
-
(1996)
Technical Report
, vol.TR-96-050
-
-
Crosbie, M.1
Dole, B.2
Ellis, T.3
Krsul, I.4
Spaord, E.5
-
7
-
-
0012056837
-
A prototype IDES: A real-time intrusiondetection expert system
-
Computer Science Laboratory, SRI International, Menlo Park
-
Denning DE, Edwards DL, Jagannathan R, Lunt TF, Neumann PG., A prototype IDES: A real-time intrusiondetection expert system. Technical report, Computer Science Laboratory, SRI International, Menlo Park, (1987)
-
(1987)
Technical Report
-
-
Denning, D.E.1
Edwards, D.L.2
Jagannathan, R.3
Lunt, T.F.4
Neumann, P.G.5
-
8
-
-
33745301987
-
Technologie agentowe w zdecentralizowanych systemach informacyjno- decyzyjnych
-
Krakow
-
Dobrowolski G., Technologie agentowe w zdecentralizowanych systemach informacyjno-decyzyjnych, Uczelniane Wydawnictwa Naukowo-Dydaktyczne, Krakow. (2002)
-
(2002)
Uczelniane Wydawnictwa Naukowo-dydaktyczne
-
-
Dobrowolski, G.1
-
10
-
-
84955563318
-
Agent-based model of computer network security system: A case study
-
Lecture Notes in Computer Science, Springer Verlag
-
Gorodetski V., Karsaev O., Khabalov A., Kotenko I., Popyack L., Skormin V. Agent-based model of Computer Network Security System: A Case Study. Proceedings of the International Workshop "Mathematical Methods, Models and Architectures for Computer Network Security. Lecture Notes in Computer Science, vol. 2052, Springer Verlag, (2001) 39-50
-
(2001)
Proceedings of the International Workshop "Mathematical Methods, Models and Architectures for Computer Network Security
, vol.2052
, pp. 39-50
-
-
Gorodetski, V.1
Karsaev, O.2
Khabalov, A.3
Kotenko, I.4
Popyack, L.5
Skormin, V.6
-
11
-
-
33745310953
-
A model for setting computer network security standards
-
Wollongong, Australia
-
Grzech A., A model for setting computer network security standards, Intelligent systems & applications. ISA '2000, Wollongong, Australia, (2000) 885-890.
-
(2000)
Intelligent Systems & Applications. ISA '2000
, pp. 885-890
-
-
Grzech, A.1
-
12
-
-
0003690982
-
System design document: Next-generation intrusion-detection expert system (NIDES)
-
Computer Science Laboratory, SRI International, Menlo Park
-
Jagannathan R, Lunt TF, Anderson D, Dodd C, Gilham F, Jalali C, Javitz HS, Neumann PG, Tamaru A, Valdes A, System Design Document: Next-generation intrusion-detection expert system (NIDES). Technical report, Computer Science Laboratory, SRI International, Menlo Park (1993)
-
(1993)
Technical Report
-
-
Jagannathan, R.1
Lunt, T.F.2
Anderson, D.3
Dodd, C.4
Gilham, F.5
Jalali, C.6
Javitz, H.S.7
Neumann, P.G.8
Tamaru, A.9
Valdes, A.10
-
16
-
-
3943075829
-
Applications of agents technology in communication: A review
-
Manvi S.S., Venkataram P., Applications of agents technology in communication: a review, Computer Communications 27, (2004) 1493-1508
-
(2004)
Computer Communications
, vol.27
, pp. 1493-1508
-
-
Manvi, S.S.1
Venkataram, P.2
|