Author of the publication

Automated discovery of concise predictive rules for intrusion detection.

, , , and . J. Syst. Softw., 60 (3): 165-175 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight agents for intrusion detection., , , , and . J. Syst. Softw., 67 (2): 109-122 (2003)Anomalous intrusion detection system for hostile Java applets., , and . J. Syst. Softw., 55 (3): 273-286 (2001)SMART mobile agent facility., , , , , and . J. Syst. Softw., 56 (1): 9-22 (2001)Feature Selection Using a Genetic Algorithm for Intrusion Detection., , , and . GECCO, page 1781. Morgan Kaufmann, (1999)A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System., , , , , and . Requir. Eng., 7 (4): 207-220 (2002)Safety Analysis of Requirements for a Product Family., , , , and . ICRE, page 24-. IEEE Computer Society, (1998)Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems., , , , , , , and . Int. J. Inf. Comput. Secur., 1 (1/2): 109-142 (2007)Automated discovery of concise predictive rules for intrusion detection., , , and . J. Syst. Softw., 60 (3): 165-175 (2002)Towards the automatic generation of mobile agents for distributed intrusion detection system., , , , , , , and . J. Syst. Softw., 79 (1): 1-14 (2006)