Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
information presentation » information representation, information propagation, information dissemination
presentation based » representation based, presentation layer, implementation based
intrusion methods » intrusive methods, inclusion methods, instruction methods
based intrusion » based instruction
information presentation » information representation, information propagation, information dissemination
presentation based » representation based, presentation layer, implementation based
intrusion methods » intrusive methods, inclusion methods, instruction methods
based intrusion » based instruction
1
by Mohamed Yassin, Warusia
Published 2015
“... rate. Detection methods based on statistical and data mining techniques are widely deployed as anomaly...”Published 2015
View full text
Thesis
2
by Mohamed Yassin, Warusia
Published 2015
“... rate. Detection methods based on statistical and data mining techniques are widely deployed as anomaly...”Published 2015
View full text
Thesis
3
Published 2005
Table of Contents:
“... Assignment Constraints in Role-Based Access Control -- Toward Modeling Lightweight Intrusion Detection System...”View full text
Electronic
eBook
4
Published 2005
Table of Contents:
“... Semantics from Dance Videos -- BioPubMiner: Machine Learning Component-Based Biomedical Information Analysis...”View full text
Electronic
eBook
5
Published 2012
Table of Contents:
“... Biclustering for Neural Information Processing -- Color Image Segmentation Based on Regional Saliency -- Mass...”View full text
Electronic
eBook
6
Published 2012
Table of Contents:
“... Nonlinear Embedding -- SNEOM: A Sanger Network Based Extended Over-Sampling Method. Application...”View full text
Electronic
eBook
7
Published 2010
Table of Contents:
“... of Heterogeneous Geospatial Information -- Information Technology -- Dynamic Web Service Composition Based...”View full text
Electronic
eBook
8
Published 2013
Table of Contents:
“... Selection -- Information-Based Scale Saliency Methods with Wavelet Sub-band Energy Density Descriptors...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“... Approach for Mining Top-Rank-k Erasable Itemsets -- Intelligent Information Retrieval New Method...”View full text
Electronic
eBook
10
Published 2014
Table of Contents:
“... Approach for Mining Top-Rank-k Erasable Itemsets -- Intelligent Information Retrieval New Method...”View full text
Electronic
eBook
11
Published 2008
Table of Contents:
“... Approach for Mixed-Integer Linear Programs -- Simulation-Based Optimization for Steel Stacking -- Robust...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... Random Fields and Their Application to Intrusion Detection -- Generalized Derivative Based Kernelized...”View full text
Electronic
eBook
13
Published 2012
Table of Contents:
“... -- HERO – A Home Based Routing in Pocket Switched Networks -- Routing for Information Leakage Reduction...”View full text
Electronic
eBook
14
Published 2008
Table of Contents:
“... and Emergence in Self-Organizing Systems -- A Method to Derive Local Interaction Strategies for Improving...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“... Smoothness -- Kernel-Based Inductive Transfer -- State-Dependent Exploration for Policy Gradient Methods...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“... Classification -- A Bio-inspired Fusion Method for Data Visualization -- CBRid4SQL: A CBR Intrusion Detector...”View full text
Electronic
eBook
17
Published 2010
Table of Contents:
“... Movies -- Fuzzy Reasoning Boolean Petri Nets Based Method for Modeling and Analysing Genetic Regulatory...”View full text
Electronic
eBook
18
Published 2008
Table of Contents:
“... Functions on Non-equidistant Grids -- Intrusive versus Non-Intrusive Methods for Stochastic Finite Elements...”View full text
Electronic
eBook
19
Published 2005
Table of Contents:
“... Communication Systems -- Agent-Based Distributed Intrusion Alert System -- SCIDS: A Soft Computing Intrusion...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“...Agents and Multiagent Systems -- A Security Proposal Based on a Real Time Agent to Protect Web...”View full text
Electronic
eBook



