Sciweavers

COMCOM   2002
Wall of Fame | Most Viewed COMCOM-2002 Paper
COMCOM
2002
189views more  COMCOM 2002»
14 years 3 days ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source189
2Download preprint from source185
3Download preprint from source143
4Download preprint from source139
5Download preprint from source139
6Download preprint from source126
7Download preprint from source124
8Download preprint from source120
9Download preprint from source120
10Download preprint from source112
11Download preprint from source108
12Download preprint from source108
13Download preprint from source105
14Download preprint from source104
15Download preprint from source99
16Download preprint from source99
17Download preprint from source98
18Download preprint from source93
19Download preprint from source89
20Download preprint from source86
21Download preprint from source86
22Download preprint from source86
23Download preprint from source84
24Download preprint from source82
25Download preprint from source80
26Download preprint from source80
27Download preprint from source79
28Download preprint from source79
29Download preprint from source74
30Download preprint from source71
31Download preprint from source71
32Download preprint from source70
33Download preprint from source69
34Download preprint from source68
35Download preprint from source66
36Download preprint from source65
37Download preprint from source58