-
1مؤتمر
المؤلفون: Abd Elaziz, Pakinam Elamein, sobh, Mohamed, Mohamed, Hoda K.
المصدر: 2014 9th International Conference on Computer Engineering & Systems (ICCES) Computer Engineering & Systems (ICCES), 2014 9th International Conference on. :104-111 Dec, 2014
Relation: 2014 9th International Conference on Computer Engineering & Systems (ICCES)
-
2مؤتمر
المؤلفون: Mechtri, Leila, Djemili Tolba, Fatiha, Ghoualmi, Nacira
المصدر: 2010 Second International Conference on Engineering System Management and Applications Engineering Systems Management and Its Applications (ICESMA), 2010 Second International Conference on. :1-6 Mar, 2010
Relation: 2010 Second International Conference on Engineering System Management and Applications (ICESMA)
-
3دورية أكاديمية
المؤلفون: Kemmerer, R.A., Vigna, G.
المصدر: Proceedings of the IEEE Proc. IEEE Proceedings of the IEEE. 93(10):1848-1857 Oct, 2005
-
4مؤتمر
المؤلفون: Azarkasb, Sayed Omid, Ghidary, Saeed Shiri
المصدر: 2009 IEEE International Conference on Intelligence and Security Informatics Intelligence and Security Informatics, 2009. ISI '09. IEEE International Conference on. :234-234 Jun, 2009
Relation: 2009 IEEE International Conference on Intelligence and Security Informatics (ISI)
-
5
المؤلفون: Sezgin Aydin, Tamara Saad Mohamed
المصدر: Smart Science. 10:265-282
مصطلحات موضوعية: Fluid Flow and Transfer Processes, Computer Networks and Communications, business.industry, Computer science, General Engineering, Intrusion detection system, Computer security, computer.software_genre, Automation, Misuse detection, GeneralLiterature_MISCELLANEOUS, Variety (cybernetics), Computational Mathematics, Chemistry (miscellaneous), Modeling and Simulation, Anomaly detection, Internet of Things, business, computer, Energy (miscellaneous)
-
6
المؤلفون: sheren sadiq, Adel Sabry Eesa
المصدر: International Journal of Research -GRANTHAALAYAH. 8:217-225
مصطلحات موضوعية: Optimization algorithm, Computer science, business.industry, Particle swarm optimization, Intrusion detection system, Computer security, computer.software_genre, Misuse detection, Field (computer science), Genetic algorithm, Anomaly detection, The Internet, business, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::4505eb80b32107b29a8c0eeef284fa73
https://doi.org/10.29121/granthaalayah.v8.i8.2020.1031 -
7
المصدر: Advances in Networked-Based Information Systems ISBN: 9783030849122
NBiSمصطلحات موضوعية: Computer science, Anomaly detection, Intrusion detection system, Safeguarding, Overfitting, Mixture model, Computer security, computer.software_genre, Perceptron, computer, Misuse detection, Protected health information
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::39f2d5d19d998234b97f9bba345546c1
https://doi.org/10.1007/978-3-030-84913-9_18 -
8
المؤلفون: Liberios Vokorokos, Anton Balaz
المصدر: Petri Nets Applications
مصطلحات موضوعية: Intranet, Computer science, business.industry, Enterprise information security architecture, Intrusion detection system, Computer security, computer.software_genre, Misuse detection, Information system, The Internet, Anomaly detection, business, Host (network), computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bb94ca0718e1d56a503a54e7f0f53d6f
http://www.intechopen.com/articles/show/title/architecture-of-computer-intrusion-detection -based-on-partially-ordered-events -
9
المؤلفون: Yufei Wang
مصطلحات موضوعية: ALARM, Warning system, Computer science, Cyber-physical system, Anomaly detection, Computer security, computer.software_genre, Misuse detection, computer, Cascading failure, Power (physics), Microgeneration
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::4b4e1fb3a2840b189a97780b34114930
https://doi.org/10.1016/b978-0-12-821726-9.00008-4 -
10مؤتمر
المؤلفون: TIAN Junfeng, ZHANG Zhe, ZHAO Weidong
المصدر: Proceedings of the 11th Joint International Computer Conference: Jicc 2005; 2005, p324-327, 4p