Intrusion detection systems (Computer security)
Overview
Works: | 8 works in 7 publications in 7 languages |
---|
Titles
Network intrusion analysis[electronic resource] :methodologies, tools, and techniques for incident analysis and response /
by:
(Language materials, printed)
Research in attacks, intrusions, and defenses[electronic resource] :17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014 : proceedings /
by:
(Language materials, printed)
Detection of intrusions and malware, and vulnerability assessment[electronic resource] :11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings /
by:
(Language materials, printed)
Energy-efficient area coverage for intruder detection in sensor networks[electronic resource] /
by:
(Language materials, printed)
Detection of intrusions and malware, and vulnerability assessment[electronic resource] :12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015 : proceedings /
by:
(Language materials, printed)
Research in attacks,intrusions, and defenses[electronic resource] :18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015 : proceedings /
by:
(Language materials, printed)
Research in attacks, intrusions, and defenses[electronic resource] :19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016 : proceedings /
by:
(Electronic resources)
Network anomaly detection[electronic resource] :a machine learning perspective /
by:
(Electronic resources)
Subjects