Search Results for detection. - Narrowed by: Computer network architectures.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003ddetection.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetwork$002barchitectures.$002509Computer$002bnetwork$002barchitectures.$0026ps$003d300?
2025-12-14T12:41:17Z
Malware Detection
ent://SD_ILS/0/SD_ILS:166294
2025-12-14T12:41:17Z
2025-12-14T12:41:17Z
Author Christodorescu, Mihai. editor. Jha, Somesh. editor. Maughan, Douglas. editor. Song, Dawn. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection Systems
ent://SD_ILS/0/SD_ILS:167451
2025-12-14T12:41:17Z
2025-12-14T12:41:17Z
Author Mancini, Luigi V. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2025-12-14T12:41:17Z
2025-12-14T12:41:17Z
Author Flegel, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2025-12-14T12:41:17Z
2025-12-14T12:41:17Z
Author Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Topic Detection and Classification in Social Networks The Twitter Case
ent://SD_ILS/0/SD_ILS:399169
2025-12-14T12:41:17Z
2025-12-14T12:41:17Z
Author Milioris, Dimitrios. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-66414-9">https://doi.org/10.1007/978-3-319-66414-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334403
2025-12-14T12:41:17Z
2025-12-14T12:41:17Z
Author Flegel, Ulrich. editor. Markatos, Evangelos. editor. Robertson, William. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334403.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37300-8">http://dx.doi.org/10.1007/978-3-642-37300-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334760
2025-12-14T12:41:17Z
2025-12-14T12:41:17Z
Author Rieck, Konrad. editor. Stewin, Patrick. editor. Seifert, Jean-Pierre. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334760.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39235-1">http://dx.doi.org/10.1007/978-3-642-39235-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Intrusion Detection and Prevention Concepts and Techniques
ent://SD_ILS/0/SD_ILS:167906
2025-12-14T12:41:17Z
2025-12-14T12:41:17Z
Author Ghorbani, Ali A. author. Lu, Wei. author. Tavallaee, Mahbod. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88771-5">http://dx.doi.org/10.1007/978-0-387-88771-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmustern
ent://SD_ILS/0/SD_ILS:185059
2025-12-14T12:41:17Z
2025-12-14T12:41:17Z
Author Meier, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-48258-1">http://dx.doi.org/10.1007/978-3-540-48258-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>