Search Results for Detection. - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dDetection.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list 2024-11-28T01:35:23Z Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:287102 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Masud, Mehedy.&#160;Khan, Latifur.&#160;Thuraisingham, Bhavani M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439854556">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:148333 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Hay, Andrew.&#160;Cid, Daniel.&#160;Bray, Rory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Snort 2.1 intrusion detection ent://SD_ILS/0/SD_ILS:253989 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Beale, Jay.&#160;Alder, Raven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:254005 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Beale, Jay.&#160;Foster, James C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cisco security professional's guide to secure intrusion detection systems ent://SD_ILS/0/SD_ILS:254024 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Burton, James.&#160;Dubrawsky, Ida.&#160;Osipov, Vitaly.&#160;Baumrucker, C. Tate.&#160;Sweeney, Michael<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485414 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Perdisci, Roberto. editor.&#160;Maurice, Cl&eacute;mentine. editor. (orcid)0000-0002-8896-9494&#160;Giacinto, Giorgio. editor. (orcid)0000-0002-5759-3017&#160;Almgren, Magnus. editor. (orcid)0000-0002-3383-9617&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-22038-9">https://doi.org/10.1007/978-3-030-22038-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:399859 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Kim, Kwangjo. author.&#160;Aminanto, Muhamad Erza. author.&#160;Tanuwidjaja, Harry Chandra. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 15th International Conference, DIMVA 2018, Saclay, France, June 28&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401646 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Giuffrida, Cristiano. editor.&#160;Bardin, S&eacute;bastien. editor.&#160;Blanc, Gregory. editor. (orcid)0000-0001-8150-6617&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93411-2">https://doi.org/10.1007/978-3-319-93411-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detection ent://SD_ILS/0/SD_ILS:400715 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Salmani, Hassan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies ent://SD_ILS/0/SD_ILS:459204 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Winkler, Ira, author.&#160;Gomes, Araceli Treu, author.&#160;Shackleford, Dave, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The state of the art in intrusion prevention and detection ent://SD_ILS/0/SD_ILS:356396 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;ONLINE(356396.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482203523">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489080 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Dietrich, Sven. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08509-8">https://doi.org/10.1007/978-3-319-08509-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> OS X incident response : scripting and analysis ent://SD_ILS/0/SD_ILS:458869 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Bradley, Jaron, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning forensics for law enforcement, security, and intelligence ent://SD_ILS/0/SD_ILS:285221 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Mena, Jesus.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439860700">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data mining and machine learning in cybersecurity ent://SD_ILS/0/SD_ILS:290743 2024-11-28T01:35:23Z 2024-11-28T01:35:23Z Author&#160;Dua, Sumeet.&#160;Du, Xian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439839430">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>