-
1
-
-
0037236310
-
Autonomic personal computing
-
Bantz, Bisdikian, Challener, Karidis, Mastrianni, Mohindra, Shea and Vanover. "Autonomic Personal Computing." IBM Systems Journal 42, no. 1 (2003): 165-76.
-
(2003)
IBM Systems Journal
, vol.42
, Issue.1
, pp. 165-176
-
-
Bantz1
Bisdikian2
Challener3
Karidis4
Mastrianni5
Mohindra6
Shea7
Vanover8
-
2
-
-
78651583709
-
Agent IDS based on misuse approach
-
Barika, F., Kadhi, N. E. & Ghédira, K. (2009) Agent IDS based on Misuse Approach. Journal of Software, 4, 495-507.
-
(2009)
Journal of Software
, vol.4
, pp. 495-507
-
-
Barika, F.1
Kadhi, N.E.2
Ghédira, K.3
-
4
-
-
64549160247
-
Next-generation misuse and anomaly prevention system
-
edited by Joaquim Filipe and José Cordeiro Springer Berlin Heidelberg
-
Bringas, Pablo García, and Yoseba K. Penya. "Next-Generation Misuse and Anomaly Prevention System." In Enterprise Information Systems, edited by Joaquim Filipe and José Cordeiro, 117-29: Springer Berlin Heidelberg, 2009.
-
(2009)
Enterprise Information Systems
, pp. 117-129
-
-
Bringas, P.G.1
Penya, Y.K.2
-
5
-
-
84926146147
-
-
edited by Lon Levitan: IBM Press
-
Dale Kutnick, William Zachmann, Val Sribar, Jack Gold, and David Cearley. "Ibm Advances toward Autonomic Computing." edited by Lon Levitan: IBM Press, 2001.
-
(2001)
Ibm Advances Toward Autonomic Computing
-
-
Kutnick, D.1
Zachmann, W.2
Sribar, V.3
Gold, J.4
Cearley, D.5
-
6
-
-
51049084560
-
Design and implementation of an anomaly detection system: An empirical approach
-
Paper presented at
-
Deri, Luca, Stefano Suin, and Gaia Maselli. "Design and Implementation of an Anomaly Detection System: An Empirical Approach." Paper presented at the Terena Networking Conference 2003.
-
(2003)
The Terena Networking Conference
-
-
Deri, L.1
Suin, S.2
Maselli, G.3
-
7
-
-
42449088961
-
Asurvey of autonomic computing - Degrees, models, and applications
-
Huebscher, Markus C., and JULIE A. Mccann. "Asurvey of Autonomic Computing - Degrees, Models, and Applications." ACM Computing Surveys 40, no. 3 (2008).
-
(2008)
ACM Computing Surveys
, vol.40
, Issue.3
-
-
Huebscher, M.C.1
Julie, A.M.2
-
8
-
-
71949099820
-
Intrusion prevention system base on immune vaccination
-
Jiang, Yaping, and Junlin Chang. "Intrusion Prevention System Base on Immune Vaccination." IEEE Computer Society (2009): 350-53
-
(2009)
IEEE Computer Society
, pp. 350-353
-
-
Jiang, Y.1
Chang, J.2
-
9
-
-
0037253062
-
The vision of autonomic computing
-
Kephart, and Chess. "The Vision of Autonomic Computing." IEEE Computer Society 36, no. 1 (2003): 41-50.
-
(2003)
IEEE Computer Society
, vol.36
, Issue.1
, pp. 41-50
-
-
Kephart1
Chess2
-
13
-
-
80054085347
-
Multi-level and secured agent-based intrusion detection system
-
Sodiya, A. S. (2006) Multi-level and Secured Agent-based Intrusion Detection System. Journal of Computing and Information Technology, 14, 217-223.
-
(2006)
Journal of Computing and Information Technology
, vol.14
, pp. 217-223
-
-
Sodiya, A.S.1
-
17
-
-
70449481775
-
Intrusion detection model based on hierarchical fuzzy inference system
-
IEEE Computer Society Press
-
Zhou, Ping, and Jian Fang. "Intrusion Detection Model Based on Hierarchical Fuzzy Inference System." In Second International Conference on Information and Computing Science, 144-47: IEEE Computer Society Press, 2009.
-
(2009)
Second International Conference on Information and Computing Science
, pp. 144-147
-
-
Zhou, P.1
Fang, J.2
|