Facet browsing currently unavailable
Page 1 of 7410 results
Sort by: relevance publication year
Process mining and hierarchical clustering to help intrusion alert visualization JOURNAL ARTICLE published March 2018 in Computers & Security Research funded by Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (1290203) |
WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks JOURNAL ARTICLE published March 2010 in Computers & Security |
Sticky policies approach within cloud computing JOURNAL ARTICLE published September 2017 in Computers & Security |
Malware: Troy revisited JOURNAL ARTICLE published January 1999 in Computers & Security |
A fast malware detection algorithm based on objective-oriented association mining JOURNAL ARTICLE published November 2013 in Computers & Security |
From the editor JOURNAL ARTICLE published July 1992 in Computers & Security |
Intrusion detection: Approach and performance issues of the SECURENET system JOURNAL ARTICLE published 1994 in Computers & Security |
Compsec 2002: the complete security circle JOURNAL ARTICLE published November 2002 in Computers & Security |
Conference focuses on reduction of software risks JOURNAL ARTICLE published April 1988 in Computers & Security |
Information technology and dataveillance JOURNAL ARTICLE published August 1988 in Computers & Security |
Positive alternatives to computer misuse: A report of the proceedings of an ACM panel on hacking JOURNAL ARTICLE published April 1987 in Computers & Security |
Single unit offers Internet security JOURNAL ARTICLE published January 1998 in Computers & Security |
Planned privacy law weakend JOURNAL ARTICLE published December 1992 in Computers & Security |
International board of referees JOURNAL ARTICLE published October 1991 in Computers & Security |
An adaptive method for anomaly detection in symmetric network traffic JOURNAL ARTICLE published September 2007 in Computers & Security |
A conventional approach to secret balloting in computer networks JOURNAL ARTICLE published January 1996 in Computers & Security |
Open systems security: Traps and pitfalls JOURNAL ARTICLE published January 1995 in Computers & Security |
BSA toughens up on pirates JOURNAL ARTICLE published January 1995 in Computers & Security |
How safe is your data JOURNAL ARTICLE published August 1988 in Computers & Security |
IFIP SEC 2009 Advert JOURNAL ARTICLE published May 2009 in Computers & Security |