The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communications
2002, volume: 25, number: 15

  1. Ray Hunt
    Special issue on Intrusion Detection systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:15, pp:1355- [Journal]
  2. Theuns Verwoerd, Ray Hunt
    Intrusion detection techniques and approaches. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:15, pp:1356-1365 [Journal]
  3. Sanjay K. Jha, Mahbub Hassan
    Building agents for rule-based intrusion detection system. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:15, pp:1366-1373 [Journal]
  4. Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
    Design and implementation of a decentralized prototype system for detecting distributed attacks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:15, pp:1374-1391 [Journal]
  5. Wayne A. Jansen
    Intrusion detection with mobile agents. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:15, pp:1392-1401 [Journal]
  6. Theuns Verwoerd, Ray Hunt
    Security architecture testing using IDS - a case study. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:15, pp:1402-1412 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002