Application Data Consistency Checking for Anomaly Based Intrusion Detection | 3 | 0.42 | 2009 |
Building an Application Data Behavior Model for Intrusion Detection | 1 | 0.35 | 2009 |
The Mitnick Case: How Bayes Could Have Helped | 2 | 0.39 | 2005 |
Un système de détection d'intrusions distribué pour réseaux ad hoc. | 0 | 0.34 | 2004 |
L'action concertée incitative Sécurité et informatique. | 0 | 0.34 | 2004 |
Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches | 62 | 7.64 | 2002 |