Books on the topic 'Adaptive Intrusion Detection System'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 16 books for your research on the topic 'Adaptive Intrusion Detection System.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Tsukerman, Emmanuel. Designing a Machine Learning Intrusion Detection System. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6591-8.
Full textHerrero, Alvaro. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
Find full textReal world Linux security: Intrusion protection, detection, and recovery. 2nd ed. Upper Saddle River, N.J: Prentice Hall, 2003.
Find full textToxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Upper Saddle River, NJ: Prentice Hall, 2001.
Find full textReal-world Linux security: Intrusion, prevention, detection, and recovery. Upper Saddle River, NJ: Prentice Hall, 2001.
Find full textSpenneberg, Ralf. Intrusion Detection fu r Linux-Server: Mit Open-Source-Tools Angriffe erkennen und analysieren ; mit einer Einfu hrung in die digitale Forensik. Mu nchen/Germany: Markt-und-Technik-Verl., 2003.
Find full textCarter, Earl. Cisco Secure Intrusion Detection System. Cisco Press, 2001.
Find full textCorchado, Emilio, and Álvaro Herrero. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Springer, 2014.
Find full textBlokdyk, Gerardus. Intrusion Detection System a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Find full textIntrusion Detection System Evasion durch Angriffsverschleierung in Exploiting Frameworks. Thomas Stein, 2010.
Find full text(Editor), Gregory J. Kirmeyer, Melinda Friedman (Editor), Katherine Martel (Editor), Doug Howie (Editor), Mark Lechevallier (Editor), Morteza Abbaszadegan (Editor), Mohammed Karim (Editor), James Funk (Editor), and Joseph Harbour (Editor), eds. Pathogen Intrusion into the Distribution System. American Water Works Association, 2001.
Find full textToxen, Bob. Real World Linux Security: Intrusion Prevention, Detection and Recovery. Prentice Hall PTR, 2000.
Find full textToxen, Bob. Real World Linux Security: Intrusion Prevention, Detection and Recovery. Prentice Hall PTR, 2000.
Find full textCCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) (2nd Edition) (Self-Study Guide). 2nd ed. Cisco Press, 2004.
Find full textUsing a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository. Storming Media, 2001.
Find full textDevelopment of an adaptive failure-detection and identification system for detecting aircraft control-element failures. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Division, 1991.
Find full text