1
by Mohamed Yassin, Warusia
Published 2015
... rate. Detection methods based on statistical and data mining techniques are widely deployed as anomaly...
View full text
Thesis
2
by Mohamed Yassin, Warusia
Published 2015
... rate. Detection methods based on statistical and data mining techniques are widely deployed as anomaly...
View full text
Thesis
3
Published 2005
Table of Contents: ... Assignment Constraints in Role-Based Access Control -- Toward Modeling Lightweight Intrusion Detection System...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... Semantics from Dance Videos -- BioPubMiner: Machine Learning Component-Based Biomedical Information Analysis...
View full text
Electronic eBook
5
Published 2012
Table of Contents: ... Biclustering for Neural Information Processing -- Color Image Segmentation Based on Regional Saliency -- Mass...
View full text
Electronic eBook
6
Published 2012
Table of Contents: ... Nonlinear Embedding -- SNEOM: A Sanger Network Based Extended Over-Sampling Method. Application...
View full text
Electronic eBook
7
Published 2010
Table of Contents: ... of Heterogeneous Geospatial Information -- Information Technology -- Dynamic Web Service Composition Based...
View full text
Electronic eBook
8
Published 2013
Table of Contents: ... Selection -- Information-Based Scale Saliency Methods with Wavelet Sub-band Energy Density Descriptors...
View full text
Electronic eBook
9
Published 2014
Table of Contents: ... Approach for Mining Top-Rank-k Erasable Itemsets -- Intelligent Information Retrieval New Method...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... Approach for Mining Top-Rank-k Erasable Itemsets -- Intelligent Information Retrieval New Method...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ... Approach for Mixed-Integer Linear Programs -- Simulation-Based Optimization for Steel Stacking -- Robust...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... Random Fields and Their Application to Intrusion Detection -- Generalized Derivative Based Kernelized...
View full text
Electronic eBook
13
Published 2012
Table of Contents: ... -- HERO – A Home Based Routing in Pocket Switched Networks -- Routing for Information Leakage Reduction...
View full text
Electronic eBook
14
Published 2008
Table of Contents: ... and Emergence in Self-Organizing Systems -- A Method to Derive Local Interaction Strategies for Improving...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ... Smoothness -- Kernel-Based Inductive Transfer -- State-Dependent Exploration for Policy Gradient Methods...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ... Classification -- A Bio-inspired Fusion Method for Data Visualization -- CBRid4SQL: A CBR Intrusion Detector...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ... Movies -- Fuzzy Reasoning Boolean Petri Nets Based Method for Modeling and Analysing Genetic Regulatory...
View full text
Electronic eBook
18
Published 2008
Table of Contents: ... Functions on Non-equidistant Grids -- Intrusive versus Non-Intrusive Methods for Stochastic Finite Elements...
View full text
Electronic eBook
19
Published 2005
Table of Contents: ... Communication Systems -- Agent-Based Distributed Intrusion Alert System -- SCIDS: A Soft Computing Intrusion...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ...Agents and Multiagent Systems -- A Security Proposal Based on a Real Time Agent to Protect Web...
View full text
Electronic eBook