Facet browsing currently unavailable
Page 1 of 7376 results
Sort by: relevance publication year
Process mining and hierarchical clustering to help intrusion alert visualization JOURNAL ARTICLE published March 2018 in Computers & Security Research funded by Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (1290203) |
Cyber-attack detection in SCADA systems using temporal pattern recognition techniques JOURNAL ARTICLE published July 2019 in Computers & Security |
WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks JOURNAL ARTICLE published March 2010 in Computers & Security |
Sticky policies approach within cloud computing JOURNAL ARTICLE published September 2017 in Computers & Security |
Aggregation-based location privacy: An information theoretic approach JOURNAL ARTICLE published October 2020 in Computers & Security |
Malware: Troy revisited JOURNAL ARTICLE published January 1999 in Computers & Security |
RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection JOURNAL ARTICLE published March 2015 in Computers & Security |
A fast malware detection algorithm based on objective-oriented association mining JOURNAL ARTICLE published November 2013 in Computers & Security |
Information security policy non-compliance: Can capitulation theory explain user behaviors? JOURNAL ARTICLE published January 2022 in Computers & Security |
Flexible software protection JOURNAL ARTICLE published May 2022 in Computers & Security Research funded by Fonds Wetenschappelijk Onderzoek (3G0E2318) | Agentschap voor Innovatie door Wetenschap en Technologie (141758) |
A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges JOURNAL ARTICLE published January 2023 in Computers & Security |
From the editor JOURNAL ARTICLE published July 1992 in Computers & Security |
Intrusion detection: Approach and performance issues of the SECURENET system JOURNAL ARTICLE published 1994 in Computers & Security |
Compsec 2002: the complete security circle JOURNAL ARTICLE published November 2002 in Computers & Security |
Conference focuses on reduction of software risks JOURNAL ARTICLE published April 1988 in Computers & Security |
Information technology and dataveillance JOURNAL ARTICLE published August 1988 in Computers & Security |
Positive alternatives to computer misuse: A report of the proceedings of an ACM panel on hacking JOURNAL ARTICLE published April 1987 in Computers & Security |
Single unit offers Internet security JOURNAL ARTICLE published January 1998 in Computers & Security |
Planned privacy law weakend JOURNAL ARTICLE published December 1992 in Computers & Security |
International board of referees JOURNAL ARTICLE published October 1991 in Computers & Security |