Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design, Volume 3: Issues and Practices. – М.: Morgan Kaufmann, 2005. – 336 с. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с. Gray Hat Hacking The Ethical Hackers Handbook, 3Rd Edition. – М.: , 2011. – 720 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Peichung Shih. Facial Analysis in Video: Detection and Recognition. – М.: Scholars Press, 2013. – 176 с. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Shui-cheong Kam. Assessing of Circuit Breaker Restrike Risks Using Computer Simulation. – М.: LAP Lambert Academic Publishing, 2012. – 380 с. Sampath V.P. FPGA Based Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Waqas Ahmed Rana. GSM Based System Design for Home Automation and Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Elez Shenhar and Ilan Shallom. Uniform Non-Intrusive Speech Quality Assessment Model. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Festus T. Ejikemeuwa,Sabestine O. Ejike and Onyinyechi F.A Ofoh. Three Stage Intruder Radio Alert System. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Elijah Edet Nkitnam. Analytic Signal Analysis Of Aeromagnetic Data Over Zaria Area, Nigeria. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Mohsin Mahmood. GSM Based System Design for Home Automation and Security. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Husniza Razalli,Rahmita Wirza O. K. Rahmad and Ramlan Mahmod. Real Time Face-Tracking and Iris Localization. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с. Saad Usman. Spatio Temporal Anomaly Detector. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. P. Ganesh Kumar and S. Ramesh. Secure Routing Protocol for ICMN. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Gaurav Mishra and Gulshan Ahuja. Classification of data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2013. – 52 с. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с. Manju Bala and R. K. Agrawal. Multiple Classifier Systems Analysis and Design. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Sultan H. Aljahdali and Mohd. Junedul Haque. Intelligent Approaches to Data Management. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Amanpreet Chauhan. Survey on data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Kamaruzaman Maskat and Mohd Afizi Mohd Shukran. Agent Based Snort In Distributed Environment. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Mafaz M. K. Al-Anezi and Najla B. I. Al-Dabagh. Multilayer Artificial Immune Systems for Intrusion & Malware Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с. Keijo Haataja. Security Threats and Countermeasures in Bluetooth-Enabled Systems. – М.: LAP Lambert Academic Publishing, 2009. – 188 с. vudasreenivasa rao. DISTRIBUTED DATA MINING AND MINING MULTI-AGENT DATA. – М.: LAP Lambert Academic Publishing, 2011. – 152 с. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с. Joao Antunes. Network Attack Injection. – М.: Scholars' Press, 2013. – 268 с. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с. Дополнительные результаты Zabihollah Rezaee. Financial Statement Fraud: Prevention and Detection. – М.: , 0. – 0 с. Douglas M. Patterson, Richard A. Ashley. A Nonlinear Time Series Workshop - A Toolkit for Detecting and Identifying Nonlinear Serial (DYNAMIC MODELING AND ECONOMETRICS IN ECONOMICS AND). – М.: , 0. – 0 с. James E. Lukaszewski. When You Are the Target : Coping With Activist Intrusions and Threats. – М.: , 0. – 0 с. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с. Chris Hawley. HazMat Air Monitoring & Detection Devices. – М.: , 0. – 0 с. Robert G. Hagstrom. The Detective and The Investor: Uncovering Investment Techniques from the Legendary Sleuths. – М.: , 0. – 0 с. Jordan E. Goodman. Reading between the Lies : How to detect fraud and avoid becoming a victom of Wall Street's next scandal. – М.: , 0. – 0 с. Jeffrey A. Cuddy. The Ultimate Breakthrough in Market Turning Point Detection: Catching Every Major Pivot in Stocks, Options, and Futures with the PAMA Method. – М.: Windsor Books, 1997. – 168 с. Jose Nazario, Nazario. Defense and Detection Strategies against Internet Worms. – М.: , 0. – 0 с. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с. Robert G. Hagstrom. The Detective and the Investor (Paperback) : Uncovering Investment Techniques from the Legendary Sleuths. – М.: , 2004. – 0 с. Scott Mackay. Old Scores (Detective Barry Gilbert, 3). – М.: , 2003. – 320 с. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с. Martin Fridson. Unwarranted Intrusions: The Case Against Government Intervention in the Marketplace. – М.: , 2006. – 309 с. Howard Silverstone, Howard R. Davia. Fraud 101: Techniques and Strategies for Detection. – М.: , 2005. – 238 с. Randolph A Smith, Stephen Davis. The Psychologist as Detective: An Introduction to Conducting Research in Psychology (4th Edition). – М.: , 2006. – 480 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с. Optimizing Molecular Methods to Detect Human Caliciviruses in Environmental Samples. – М.: , 2008. – 84 с. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design, Volume 3: Issues and Practices. – М.: Morgan Kaufmann, 2005. – 336 с. Shankar Narasimhan, S. Narasimhan, C. Jordache. Data Reconciliation and Gross Error Detection: An Intelligent Use of Process Data. – М.: Gulf Professional Publishing, 2006. – 428 с. Morton J. Canty. Image Analysis, Classification and Change Detection in Remote Sensing. – М.:
, 2006. – 348 с. Keith Chugg, Achilleas Anastasopoulos, Xiaopeng Chen. Iterative Detection - Adaptivity, Complexity Reduction, and Applications. – М.: Springer, 2000. – 392 с. Principles of Bacterial Detection: Biosensors, Recognition Receptors and Microsystems. – М.: , 2008. – 1040 с. Walter Blum, Werner Riegler, Luigi Rolandi. Particle Detection with Drift Chambers (Particle Acceleration and Detection). – М.: , 2008. – 454 с. Steve Voake. Insect Detective. – М.: , 2010. – 32 с. Jinho Choi. Optimal Combining and Detection: Statistical Signal Processing for Communications. – М.: , 2010. – 352 с. Magued Iskander. Modelling with Transparent Soils: Visualizing Soil Structure Interaction and Multi Phase Flow, Non-Intrusively (Springer Series in Geomechanics and Geoengineering). – М.: , 2010. – 300 с. Zhiguo Wang, Baofeng Yang. MicroRNA Expression Detection Methods. – М.: , 2010. – 387 с. Stephen Pedneault. Preventing and Detecting Employee Theft and Embezzlement. – М.: , 2010. – 310 с. Tommy Oberg. Modulation, Detection and Coding. – М.: , 2001. – 480 с. Barb Karg. The History Detectives Explore Lincoln?s Letter, Parker?s Sax, and Mark Twain?s Watch. – М.: , 2008. – 408 с. M. Henini. Handbook of Infra-red Detection Technologies. – М.: , 2010. – 532 с. Daniel L. Purich. Enzyme Kinetics and Mechanism, Part F: Detection and Characterizationof Enzyme Reaction Intermediates,354. – М.: , 2010. – 650 с. Shirley J. Gee. Environmental Immunochemical Analysis Detection of Pesticides and Other Chemicals. – М.: , 2010. – 119 с. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с. Michael Rash. Intrusion Prevention and Active Response. – М.: , 2010. – 550 с. Jesus Mena. Investigative Data Mining for Security and Criminal Detection. – М.: , 2010. – 272 с. Michael Kolawole. Radar Systems, Peak Detection and Tracking. – М.: , 2010. – 400 с. Joseph W. Maresca. Volumetric Leak Detection Methods for Underground Fuel Storage Tanks. – М.: , 2010. – 371 с. Arthur E. Lord. Detection of Subsurface Hazardous Waste Containers by Nondestructive Techniques. – М.: , 2010. – 91 с. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с. Hong-Yue Zhang. Fault Detection, Supervision and Safety of Technical Processes 2006. – М.: , 2010. – 1576 с. CAMACHO ET AL. PROCEEDINGS OF THE 15TH WORLD CONGRESS VOL JFAULT DETECTION AND SUPERVISIONIFAC PROCEEDINGS VOLUME (IPV). – М.: , 2010. – 0 с. J. Chen. Fault Detection, Supervision and Safety for Technical Processes 1997,(3-Volume Set). – М.: , 2010. – 0 с. Daniela Berg. Transcranial sonography and the detection of neurodegenerative disease,90. – М.: , 2010. – 320 с. Maurice Marshall. Aspects of Explosives Detection. – М.: , 2010. – 302 с. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с. Maria Luisa Marina. Analysis and Detection by Capillary Electrophoresis,45. – М.: , 2010. – 796 с. Thomas J. Chambers. The Flaviviruses: Detection, Diagnosis and Vaccine Development,61. – М.: , 2010. – 577 с. P.S. Dhurjati. On-Line Fault Detection and Supervision in the Chemical Process Industries 1998. – М.: , 2010. – 0 с. Jehuda Yinon. Counterterrorist Detection Techniques of Explosives. – М.: , 2010. – 454 с. Chris Hurley. WarDriving: Drive, Detect, Defend. – М.: , 2010. – 512 с. Eva Wu. Fault Detection, Supervision and Safety of Technical Processes. – М.: , 2010. – 1204 с. David McCombs. Detecting the World. – М.: , 2010. – 344 с. Robert N. McDonough. Detection of Signals in Noise. – М.: , 2010. – 495 с. Russell J. Schmitt. Detecting Ecological Impacts. – М.: , 2010. – 401 с. T. McAvoy. Fault Detection II, Aerospace, Marine Systems,Volume P. – М.: , 2010. – 0 с. John N. Abelson. Nitric Oxide, Part A: Sources and Detection of NO; NO Synthase,268. – М.: , 2010. – 555 с. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с. S. Niaki. Underground Tank Leak Detection Methods. – М.: , 2010. – 134 с. I Ousby. Ousby: ?bloodhounds? Of Heaven: The Detective In English Fiction From Godwin To Doyle. – М.: , 1976. – 185 с. Yunte Huang. Charlie Chan – The Untold Story of the Honorable Detective and his Rendezvous with American History. – М.: , 2010. – 288 с. Harvey Rachlin. The Making of a Detective. – М.: , 1996. – 320 с. Yunte Huang. Charlie Chan – The Untold Story of the Honorable Detective and His Rendezvous with American History. – М.: , 2011. – 0 с. Jeffery C May. Jeff May?s Healthy Home Tips – A Workbook for Detecting, Diagnosing and Eliminating Pesky Pests, Stinky Stenches, Musty Mold and Other Aggravating. – М.: , 2008. – 160 с. Pricilla L Walton. Detective Agency – Women Rewriting The Hard–Boiled Tradition (Paper). – М.: , 1999. – 328 с. Aaron Noah. Hoorwitz. The Clinical Detective – Techniques in the Evaluation of Sexual Abuse. – М.: , 1992. – 314 с. Richard Chandler. Statistical Methods for Trend Detection and Analysis in the Environmental Sciences. – М.: , 2011. – 384 с. Friedman. Detection of Signals by Template Matching. – М.: , 1969. – 0 с. John C Trueswell. Why Does the World Exist? – An Existential Detective Story. – М.: , 2004. – 368 с. John C Trueswell. Why Does the World Exist? – An Existential Detective Story. – М.: , 1973. – 0 с. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Peichung Shih. Facial Analysis in Video: Detection and Recognition. – М.: Scholars Press, 2013. – 176 с. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Sampath V.P. FPGA Based Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Elez Shenhar and Ilan Shallom. Uniform Non-Intrusive Speech Quality Assessment Model. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с. Saad Usman. Spatio Temporal Anomaly Detector. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Gaurav Mishra and Gulshan Ahuja. Classification of data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2013. – 52 с. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с. Manju Bala and R. K. Agrawal. Multiple Classifier Systems Analysis and Design. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Sultan H. Aljahdali and Mohd. Junedul Haque. Intelligent Approaches to Data Management. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Amanpreet Chauhan. Survey on data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Kamaruzaman Maskat and Mohd Afizi Mohd Shukran. Agent Based Snort In Distributed Environment. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Mafaz M. K. Al-Anezi and Najla B. I. Al-Dabagh. Multilayer Artificial Immune Systems for Intrusion & Malware Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с. vudasreenivasa rao. DISTRIBUTED DATA MINING AND MINING MULTI-AGENT DATA. – М.: LAP Lambert Academic Publishing, 2011. – 152 с. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Саша Вчера защитилась, спасибо Вам большое за чудесный диплом после вашего сопровождения!!!)