Cloud SSDLC: Cloud Security Governance Deployment Framework in Secure System Development Life Cycle | 3 | 0.40 | 2012 |
C&C tracer: Botnet command and control behavior tracing | 5 | 0.60 | 2011 |
Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems | 0 | 0.34 | 2009 |
Design Of One-Cycle Control Power Factor Correction Ic With Unipolar Supply Voltage | 0 | 0.34 | 2009 |
A Real-Time Network Intrusion Detection System Based On Incremental Mining Approach | 1 | 0.36 | 2008 |
Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN | 6 | 0.50 | 2008 |
Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems | 1 | 0.41 | 2008 |