Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5435
search results - page 65 / 1087
»
Informed Detection Revisited
Sort
relevance
views
votes
recent
update
View
thumb
title
104
click to vote
ACISICIS
2005
IEEE
59
views
Information Technology
»
more
ACISICIS 2005
»
A Review Approach to Detecting Structural Consistency Violations in Programs
15 years 9 months ago
Download
cis.k.hosei.ac.jp
Yuting Chen, Shaoying Liu, Fumiko Nagoya
claim paper
Read More »
89
click to vote
IAW
2003
IEEE
106
views
Information Technology
»
more
IAW 2003
»
Hidden Processes: The Implication for Intrusion Detection
15 years 9 months ago
Download
www.blackhat.com
James Butler, Jeffrey Undercoffer, John Pinkston
claim paper
Read More »
124
click to vote
IAW
2003
IEEE
162
views
Information Technology
»
more
IAW 2003
»
Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic Parameters
15 years 9 months ago
Download
www.iranet.ir
Jun Li, Constantine N. Manikopoulos
claim paper
Read More »
99
click to vote
BCI
2009
IEEE
131
views
Information Technology
»
more
BCI 2009
»
A Collision Detection and Resolution Multi Agent Approach Using Utility Functions
15 years 9 months ago
Download
lpis.csd.auth.gr
George Valkanas, Pantelis Natsiavas, Nick Bassilia...
claim paper
Read More »
89
click to vote
IDA
2001
Springer
89
views
Information Technology
»
more
IDA 2001
»
Errors Detection and Correction in Large Scale Data Collecting
15 years 8 months ago
Download
www.dis.uniroma1.it
Renato Bruni, Antonio Sassano
claim paper
Read More »
« Prev
« First
page 65 / 1087
Last »
Next »