Results 301 to 310 of about 716,322 (331)
Some of the next articles are maybe not open access.
Security assessment of process facilities – Intrusion modeling
Chemical Engineering Research and Design, 2018Guozheng Song, Faisal Khan
exaly
A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization
ACM Computing Surveys, 2019Ziad Ismail, Hervé Debar, Jean Leneutre
exaly
Anomaly-based network intrusion detection: Techniques, systems and challenges
Computers & security, 2009P. García-Teodoro +3 more
semanticscholar +1 more source
Host-Based Intrusion Detection System with System Calls
ACM Computing Surveys, 2019Ming Liu, Jinjun Chen
exaly

