-
1
-
-
85086877966
-
-
Working Paper, WP 15/2003, Judge Institute of Management, University of Cambridge, UK
-
Austin, M.P., Bates, R.G., Dempster, M.A.H. and Williams, S.N. (2003) Adaptive Systems for Foreign Exchange Trading, Working Paper, WP 15/2003, Judge Institute of Management, University of Cambridge, UK.
-
(2003)
Adaptive Systems for Foreign Exchange Trading
-
-
Austin, M.P.1
Bates, R.G.2
Dempster, M.A.H.3
Williams, S.N.4
-
2
-
-
0003516333
-
-
Technical Report No., Department of Computer Engineering, Chalmers University of Technology, Sweden, March
-
Axelsson, S. (2000) Intrusion Detection Systems: A Survey and Taxonomy, Technical Report No. 99-15, Department of Computer Engineering, Chalmers University of Technology, Sweden, March.
-
(2000)
Intrusion Detection Systems: A Survey and Taxonomy
-
-
Axelsson, S.1
-
5
-
-
51349128465
-
Preventing and detecting insider attacks using IDS
-
March 20
-
Einwechter, N. (2002) 'Preventing and detecting insider attacks using IDS', Security Focus, March 20, available at: http://www.securityfocus.com/infocus/1558
-
(2002)
Security Focus
-
-
Einwechter, N.1
-
6
-
-
84896900298
-
Using relative movement to support ANN-based stock forecasting in Thai stock market
-
Esichaikul, V. and Srithongnopawong, P. (2010) 'Using relative movement to support ANN-based stock forecasting in Thai stock market', International Journal of Electronic Finance, Vol. 4, No. 1, pp. 84-98.
-
(2010)
International Journal of Electronic Finance
, vol.4
, Issue.1
, pp. 84-98
-
-
Esichaikul, V.1
Srithongnopawong, P.2
-
7
-
-
3943076566
-
Cyberterrorism, computer crime, and reality
-
Foltz, C.B. (2004) 'Cyberterrorism, computer crime, and reality', Information Management & Computer Security, Vol. 12, No. 2, pp. 154-166.
-
(2004)
Information Management & Computer Security
, vol.12
, Issue.2
, pp. 154-166
-
-
Foltz, C.B.1
-
8
-
-
2942671125
-
Risk in fixed-income hedge fund styles
-
September
-
Fung, W. and Hsieh, D.A. (2002) 'Risk in fixed-income hedge fund styles', The Journal of Fixed Income, Vol. 12, No. 2, September, pp. 6-36.
-
(2002)
The Journal of Fixed Income
, vol.12
, Issue.2
, pp. 6-36
-
-
Fung, W.1
Hsieh, D.A.2
-
9
-
-
3943054719
-
Politicians speak out on cyberterrorism
-
Gengler, B. (1999) 'Politicians speak out on cyberterrorism', Network Security, Vol. 11, No. 10, p. 6.
-
(1999)
Network Security
, vol.11
, Issue.10
, pp. 6
-
-
Gengler, B.1
-
10
-
-
77953625077
-
A review of organised crime in electronic finance
-
Gottschalk, P. and Dean, G. (2009) 'A review of organised crime in electronic finance', International Journal of Electronic Finance, Vol. 3, No. 1, pp. 46-63.
-
(2009)
International Journal of Electronic Finance
, vol.3
, Issue.1
, pp. 46-63
-
-
Gottschalk, P.1
Dean, G.2
-
11
-
-
78649870798
-
Exploring the security of e-banking systems: Questions of theft, fraud, jurisdiction and the shifting sands of time
-
Jain, V. and Kohli, S. (2009) 'Exploring the security of e-banking systems: questions of theft, fraud, jurisdiction and the shifting sands of time', International Journal of Electronic Finance, Vol. 3, No. 4, pp. 339-352.
-
(2009)
International Journal of Electronic Finance
, vol.3
, Issue.4
, pp. 339-352
-
-
Jain, V.1
Kohli, S.2
-
12
-
-
79952287665
-
Use of distributed computing in derivative pricing
-
Kanniainen, J., Piche, R. and Mikkonen, T. (2009) 'Use of distributed computing in derivative pricing', International Journal of Electronic Finance, Vol. 3, No. 3, pp. 270-283.
-
(2009)
International Journal of Electronic Finance
, vol.3
, Issue.3
, pp. 270-283
-
-
Kanniainen, J.1
Piche, R.2
Mikkonen, T.3
-
13
-
-
84944737204
-
Bayesian event classification for intrusion detection
-
Las Vegas, Nevada, USA
-
Kruegel, C., Mutz, D., Robertson, W. and Valeur, F. (2003) 'Bayesian event classification for intrusion detection', 19th Annual Proceedings of the Computer Security Applications Conference, Las Vegas, Nevada, USA, pp. 14-23.
-
(2003)
19th Annual Proceedings of the Computer Security Applications Conference
, pp. 14-23
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
14
-
-
84964411176
-
Real time data mining-based intrusion detection
-
Anaheim, California, USA
-
Lee, W., Stolfo, S.J., Chan, P.K., Eskin, E., Wei F., Miller, M., Hershkop, S. and Zhang, J. (2001) 'Real time data mining-based intrusion detection', DARPA Information Survivability Conference & Exposition II Proceedings, Anaheim, California, USA, pp. 89-100.
-
(2001)
DARPA Information Survivability Conference & Exposition II Proceedings
, pp. 89-100
-
-
Lee, W.1
Stolfo, S.J.2
Chan, P.K.3
Eskin, E.4
Wei, F.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
15
-
-
84951911842
-
-
CNET News.com, December 18
-
Lemos, R. (2002) Ex-IT Worker Charged with Sabotage, CNET News.com, December 18, available at: http://news.com.com/2100-1001/978386.html
-
(2002)
Ex-IT Worker Charged with Sabotage
-
-
Lemos, R.1
-
16
-
-
67650270836
-
Firms seek edge through speed as computer trading expands
-
December 15
-
Lucchetti, A. (2006) 'Firms seek edge through speed as computer trading expands', Wall Street Journal, December 15, p.A1.
-
(2006)
Wall Street Journal
, pp. A1
-
-
Lucchetti, A.1
-
17
-
-
84993063392
-
The impact of automatic identification on supply chain operations
-
McFarlane, D. and Sheffi, Y. (2003) 'The impact of automatic identification on supply chain operations', International Journal of Logistics Management, Vol. 14, No. 1, pp. 1-17.
-
(2003)
International Journal of Logistics Management
, vol.14
, Issue.1
, pp. 1-17
-
-
McFarlane, D.1
Sheffi, Y.2
-
18
-
-
84969346266
-
A certified digital signature
-
CA, ACM, Santa Barbara
-
Merkle, R.C. (1989) 'A certified digital signature', Proceedings on Advances in Cryptology, CA, ACM, Santa Barbara, pp. 218-238.
-
(1989)
Proceedings on Advances in Cryptology
, pp. 218-238
-
-
Merkle, R.C.1
-
19
-
-
78649863388
-
Data classification process for security and privacy based on a fuzzy logic classifier
-
Mohammadian, M. and Hatzinakos, D. (2009) 'Data classification process for security and privacy based on a fuzzy logic classifier', International Journal of Electronic Finance, Vol. 3, No. 4, pp. 374-386.
-
(2009)
International Journal of Electronic Finance
, vol.3
, Issue.4
, pp. 374-386
-
-
Mohammadian, M.1
Hatzinakos, D.2
-
20
-
-
0028430224
-
Network intrusion detection
-
Mukherjee, B., Heberlein, L.T. and Levitt, K.N. (1994) 'Network intrusion detection', IEEE Network, Vol. 8, No. 3, pp. 26-41.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
23
-
-
0001843064
-
Improving HTTP latency
-
Padmanabhan, V.N. and Mogul, J.C. (1995) 'Improving HTTP latency', Computer Networks and ISDN Systems, Vol. 28, Nos. 1-2, pp. 25-35.
-
(1995)
Computer Networks and ISDN Systems
, vol.28
, Issue.1-2
, pp. 25-35
-
-
Padmanabhan, V.N.1
Mogul, J.C.2
-
24
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
Puketza, N.J., Zhang, K., Chung, M., Mukherjee, B. and Olsson, R.A. (1996) 'A methodology for testing intrusion detection systems', IEEE Transactions on Software Engineering, Vol. 22, No. 10, pp. 719-729.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.10
, pp. 719-729
-
-
Puketza, N.J.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
-
25
-
-
79957516720
-
A data model for processing financial market and news data
-
Rabhi, F., Guabtni, A. and Yao, L. (2009) 'A data model for processing financial market and news data', International Journal of Electronic Finance, Vol. 3, No. 4, pp. 387-403.
-
(2009)
International Journal of Electronic Finance
, vol.3
, Issue.4
, pp. 387-403
-
-
Rabhi, F.1
Guabtni, A.2
Yao, L.3
-
26
-
-
84947547225
-
Experiences with specification-based intrusion detection
-
LNCS 2212, Springer
-
Uppuluri, P. and Sekar, R. (2001) 'Experiences with specification-based intrusion detection', Recent Advances in Intrusion Detection, LNCS 2212, Springer, pp. 172-189.
-
(2001)
Recent Advances in Intrusion Detection
, pp. 172-189
-
-
Uppuluri, P.1
Sekar, R.2
-
27
-
-
3943071545
-
US vulnerable to cyerterrorism
-
Wehde, E. (1998) 'US vulnerable to cyerterrorism', Computer Fruad & Security, Vol. 6, No. 1, pp. 6, 7.
-
(1998)
Computer Fruad & Security
, vol.6
, Issue.1
, pp. 6-7
-
-
Wehde, E.1
|