Works matching DE "HOST-based intrusion detection systems (Computer security)"
1
- Journal of Artificial Intelligence Research, 2010, v. 39, p. 745
- Jing Xu;
- Shelton, Christian R.
- Article
2
- Wireless Networks (10220038), 2013, v. 19, n. 3, p. 301, doi. 10.1007/s11276-012-0467-7
- Elfeshawy, Nawal;
- Faragallah, Osama
- Article
3
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 3, p. 1722, doi. 10.3837/tiis.2017.03.026
- Chaoyuan Cui;
- Yun Wu;
- Yonggang Li;
- Bingyu Sun
- Article
4
- Information Security Journal: A Global Perspective, 2016, v. 25, n. 1-3, p. 18, doi. 10.1080/19393555.2015.1125974
- Moustafa, Nour;
- Slay, Jill
- Article
5
- Journal of Computer Networks & Communications, 2019, p. 1, doi. 10.1155/2019/4683982
- Sowah, Robert A.;
- Ofori-Amanfo, Kwadwo B.;
- Mills, Godfrey A.;
- Koumadi, Koudjo M.
- Article
6
- Journal of Clinical Immunology, 2014, v. 34, n. 1, p. 104, doi. 10.1007/s10875-013-9960-8
- Chandrakasan, Shanmuganathan;
- Chiwane, Saurabh;
- Adams, Matthew;
- Fathalla, Basil
- Article
7
- International Journal of Electronics & Telecommunications, 2024, v. 70, n. 2, p. 449, doi. 10.24425/ijet.2024.149565
- Arhami, Muhammad;
- Arianda, Akhbar;
- Fata, Akmalul;
- Yassir;
- Desiani, Anita;
- Arifai, Muhammad
- Article
8
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1147
- Khan, Mohd. Hamzah;
- Khan, Ihtiram Raza
- Article
9
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/524627
- Ji, Yuede;
- Li, Qiang;
- He, Yukun;
- Guo, Dong
- Article
10
- Security & Communication Networks, 2016, v. 9, n. 14, p. 2434, doi. 10.1002/sec.1514
- Hajamydeen, Asif Iqbal;
- Udzir, Nur Izura
- Article
11
- Security & Communication Networks, 2015, v. 8, n. 7, p. 1193, doi. 10.1002/sec.1074
- Derhab, Abdelouahid;
- Bouras, Abdelghani
- Article
12
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 3, p. 41
- Mehmet, Murad;
- Wijesekera, Duminda;
- Buchholtz, Miguel Fuentes
- Article
13
- Journal of Digital Forensics, Security & Law, 2013, v. 8, n. 3, p. 21
- Shaerpour, Kaveh;
- Dehghantanha, Ali;
- Mahmod, Ramlan
- Article
14
- Journal of Supercomputing, 2016, v. 72, n. 7, p. 2670, doi. 10.1007/s11227-015-1573-y
- Yin, Chunyong;
- Feng, Lu;
- Ma, Luyu
- Article
15
- Computer Science & Information Systems, 2014, v. 11, n. 2, p. 601, doi. 10.2298/CSIS130415035A
- Abuadlla, Yousef;
- Kvascev, Goran;
- Gajin, Slavko;
- Jovanović, Zoran
- Article