338 results on '"Wenke Lee"'
Search Results
302. DSO: Dependable Signing Overlay.
303. Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems.
304. Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
305. Towards the integration of diverse spam filtering techniques.
306. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware.
307. Formalizing sensitivity in static analysis for intrusion detection.
308. Simulating Internet worms.
309. Proactive detection of distributed denial of service attacks using MIB traffic variables-a feasibility study.
310. Using artificial anomalies to detect unknown and known network intrusions.
311. Erratum: Evidence for Changing of Cosmic Ray Composition between1017and1018eVfrom Multicomponent Measurements [Phys. Rev. Lett. 84, 4276 (2000)]
312. Recent Advances in Intrusion Detection : 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001 Proceedings
313. Intrusion Detection Techniques for Mobile Wireless Networks.
314. Vanishing Fermi—Gamow-Teller mixing in the positron decay ofCo58
315. Measurement of elasticνμandν¯μscattering on protons
316. Photoproduction of Narrow Resonances
317. Segmented ionization chambers for high intensity beam measurements
318. Dimuon Production by Neutrons
319. Search forνμ→νeoscillations
320. Observation of the Reactionνμ+p→νμ+p
321. Beta asymmetries in the decay of polarizedCo56
322. Fermi-Gamow-Teller Mixing in the Allowed Isospin-Hindered Positron Decay ofCo56
323. Experimental Determination of the Dalitz-Plot Distribution of the Decaysη→π+π−π0andη→π+π−γ, and the Branching Ratioη→π+π−γη→π+π−π0
324. Experimental Test ofCInvariance inη→π+π−γ
325. Taming Virtualization.
326. Inclusive Production ofΩ−andΩ¯+byKL0-Carbon Interactions in the Energy Range 80-280 GeV/c
327. Recent Results from Counter-Spark Chamber ν Experiment at BNL
328. Enabling refinable cross-host attack investigation with efficient data flow tagging and tracking
329. Exposing invisible timing-based traffic watermarks with BACKLIT
330. Agent-based cooperative anomaly detection for wireless ad hoc networks.
331. Misleading worm signature generators using deliberate noise injection.
332. Modeling system calls for intrusion detection with dynamic window sizes.
333. Real time data mining-based intrusion detection.
334. Cost-based modeling for fraud and intrusion detection: results from the JAM project.
335. USENIX Workshop on Free and Open Communications on the Internet, FOCI '11, San Francisco, CA, USA, August 8, 2011
336. 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '09, Boston, MA, USA, April 21, 2009
337. Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009
338. Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.