Current Search:  Computer security (x) » Furht, Borko (x)

View All Items

  • CSV Spreadsheet
(1 - 20 of 76)

Pages

Properties of Static and Mobile Unreliable Networks and their effects on Combating Malicious Objects
Design and analysis of key establishment protocols
Power based wide collision attacks on AES
Comparison of embedded security versus separated security in an application
NETWORK FEATURE ENGINEERING AND DATA SCIENCE ANALYTICS FOR CYBER THREAT INTELLIGENCE
Data mining heuristic-¬based malware detection for android applications
utility-based routing scheme in multi-hop wireless networks
Resource-sensitive intrusion detection models for network traffic
Techniques for combining binary classifiers: A comparative study in network intrusion detection systems
Fuzzy vault fingerprint cryptography: Experimental and simulation studies
MACHINE LEARNING ALGORITHMS FOR THE DETECTION AND ANALYSIS OF WEB ATTACKS
Implementing security in an IP Multimedia Subsystem (IMS) next generation network - a case study
DATA COLLECTION FRAMEWORK AND MACHINE LEARNING ALGORITHMS FOR THE ANALYSIS OF CYBER SECURITY ATTACKS
Machine learning algorithms for the analysis and detection of network attacks
An Empirical Study of Ordinal and Non-ordinal Classification Algorithms for Intrusion Detection in WLANs
Evaluating indirect and direct classification techniques for network intrusion detection
Firewall formulation driven by risk analysis
Mitigating worm propagation on virtual LANs
Intrusion detection in wireless networks: A data mining approach
Misuse Patterns for the SSL/TLS Protocol

Pages