25 results on '"Traore I"'
Search Results
2. A semantic analysis approach to manage IDS alerts flooding.
3. Method ontology for intelligent network forensics analysis.
4. Performance analysis of distributed software systems: A model-driven approach.
5. UML-based performance modeling of distributed software systems.
6. Cognitive-Based Biometrics System for Static User Authentication.
7. A New Method for Learning Decision Trees from Rules.
8. New Physiological Biometrics Based on Human Cognitive Factors.
9. Contract-Based Security Monitors for Service Oriented Software Architecture.
10. A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures.
11. The Impact of Google Hacking on Identity and Application Fraud.
12. A Survey of Connection-Chains Detection Techniques.
13. Systematic Security Analysis for Service-Oriented Software Architectures.
14. Integrated Security Verification and Validation: Case Study.
15. An unsupervised approach for detecting DDOS attacks based on traffic-based metrics.
16. Queue-based analysis of DoS attacks.
17. A New Evolutionary Algorithm for Determining the Optimal Number of Clusters.
18. A New Biometric Technology Based on Mouse Dynamics.
19. Anomaly intrusion detection based on biometrics
20. Queue-based analysis of DoS attacks
21. Anomaly intrusion detection based on biometrics.
22. Determining the optimal number of clusters using a new evolutionary algorithm.
23. Detecting new forms of network intrusion using genetic programming.
24. An integrated v&v environment for critical systems development.
25. Timing specification and rule-based systems.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.