Search Results for Detection. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dDetection.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list
2024-11-28T01:35:23Z
Data mining tools for malware detection
ent://SD_ILS/0/SD_ILS:287102
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Masud, Mehedy. Khan, Latifur. Thuraisingham, Bhavani M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439854556">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
OSSEC host-based intrusion detection guide
ent://SD_ILS/0/SD_ILS:148333
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Hay, Andrew. Cid, Daniel. Bray, Rory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492409">http://www.sciencedirect.com/science/book/9781597492409</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Snort 2.1 intrusion detection
ent://SD_ILS/0/SD_ILS:253989
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Beale, Jay. Alder, Raven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836043">http://www.sciencedirect.com/science/book/9781931836043</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Snort 2.0 intrusion detection
ent://SD_ILS/0/SD_ILS:254005
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Beale, Jay. Foster, James C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cisco security professional's guide to secure intrusion detection systems
ent://SD_ILS/0/SD_ILS:254024
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Burton, James. Dubrawsky, Ida. Osipov, Vitaly. Baumrucker, C. Tate. Sweeney, Michael<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266696">http://www.sciencedirect.com/science/book/9781932266696</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings
ent://SD_ILS/0/SD_ILS:485414
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Perdisci, Roberto. editor. Maurice, Clémentine. editor. (orcid)0000-0002-8896-9494 Giacinto, Giorgio. editor. (orcid)0000-0002-5759-3017 Almgren, Magnus. editor. (orcid)0000-0002-3383-9617 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-22038-9">https://doi.org/10.1007/978-3-030-22038-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Intrusion Detection using Deep Learning A Feature Learning Approach
ent://SD_ILS/0/SD_ILS:399859
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Kim, Kwangjo. author. Aminanto, Muhamad Erza. author. Tanuwidjaja, Harry Chandra. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:401646
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Giuffrida, Cristiano. editor. Bardin, Sébastien. editor. Blanc, Gregory. editor. (orcid)0000-0001-8150-6617 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93411-2">https://doi.org/10.1007/978-3-319-93411-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detection
ent://SD_ILS/0/SD_ILS:400715
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Salmani, Hassan. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
ent://SD_ILS/0/SD_ILS:459204
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Winkler, Ira, author. Gomes, Araceli Treu, author. Shackleford, Dave, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128093160">https://www.sciencedirect.com/science/book/9780128093160</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The state of the art in intrusion prevention and detection
ent://SD_ILS/0/SD_ILS:356396
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number ONLINE(356396.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482203523">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings
ent://SD_ILS/0/SD_ILS:489080
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Dietrich, Sven. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08509-8">https://doi.org/10.1007/978-3-319-08509-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
OS X incident response : scripting and analysis
ent://SD_ILS/0/SD_ILS:458869
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Bradley, Jaron, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine learning forensics for law enforcement, security, and intelligence
ent://SD_ILS/0/SD_ILS:285221
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Mena, Jesus.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439860700">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data mining and machine learning in cybersecurity
ent://SD_ILS/0/SD_ILS:290743
2024-11-28T01:35:23Z
2024-11-28T01:35:23Z
Author Dua, Sumeet. Du, Xian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439839430">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>