-
1
An efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks /
Published 2008Subjects: “…Intrusion detection systems (Computer security)…”
-
2
The development of attack response mechanism for intrusion detection system /
Published 2006Subjects: “…Intrusion detection systems (Computer security)…”
text -
3
Packet-level intrusion detection /
Published 2009Subjects: “…Intrusion detection systems (Computer security)…”
-
4
Packet-level intrusion detection [electronic resource] /
Published 2009Subjects: “…Intrusion detection systems (Computer security)…”
-
5
Intrusion detection system GA seeded K-Means approach /
Published 2010Subjects: “…Intrusion detection systems (Computer security)…”
-
6
Intrusion detection system GA seeded K-Means approach [electronic resource] /
Published 2010Subjects: “…Intrusion detection systems (Computer security)…”
-
7
Intrusion detection system PSO seeded k-means approach /
Published 2010Subjects: “…Intrusion detection systems (Computer security)…”
-
8
Intrusion detection system PSO seeded k-means approach [electronic resource] /
Published 2010Subjects: “…Intrusion detection systems (Computer security)…”
-
9
An efficient on-line hurst parameter estimator for detecting volume-based network intrusion attacks [electronic resource] /
Published 2008Subjects: “…Intrusion detection systems (Computer security)…”
-
10
Ant colony and particle swarm optimization for feature selection in intrusion detection system /
Published 2012Subjects: “…Intrusion detection systems (Computer security)…”
-
11
Ant colony and particle swarm optimization for feature selection in intrusion detection system [electronic resource] /
Published 2012Subjects: “…Intrusion detection systems (Computer security)…”
-
12
Hybrid of structural-causal and statistical model for intrusion alert correlation /
Published 2013Subjects: “…Intrusion detection systems (Computer security)…”
-
13
Intrusion detection system using hybird gsa-k-means /
Published 2013Subjects: “…Intrusion detection systems (Computer security)…”
-
14
Hybrid of structural-causal and statistical model for intrusion alert correlation [electronic resource] /
Published 2013Subjects: “…Intrusion detection systems (Computer security)…”
-
15
Intrusion detection system using hybird gsa-k-means [electronic resource] /
Published 2013Subjects: “…Intrusion detection systems (Computer security)…”
-
16
Enhancing anomalies traffic detection in grid using support vector machine /
Published 2014Subjects: “…Intrusion detection systems (Computer security)…”
-
17
Enhancing anomalies traffic detection in grid using support vector machine [electronic resource) /
Published 2014Subjects: “…Intrusion detection systems (Computer security)…”
-
18
Active response intrusion prevention system using dynamic parameters selection /
Published 2014Subjects: “…Intrusion detection systems (Computer security)…”
-
19
Web log cleaning algorithm for intrusion detection /
Published 2013Subjects: “…Intrusion detection systems (Computer security)…”
-
20
Web log cleaning algorithm for intrusion detection [electronic resource] /
Published 2013Subjects: “…Intrusion detection systems (Computer security)…”