Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Detection systems")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1352

  • Page / 55
Export

Selection :

  • and

Improving child maltreatment detection systems: a large-scale case study involving health, social services, and school professionalsCEREZO, M. Angeles; PONS-SALVADOR, Gemma.Child abuse & neglect. 2004, Vol 28, Num 11, pp 1153-1169, issn 0145-2134, 17 p.Article

RAID 2003 : recent advances in intrusion detection (Pittsburgh PA, 8-10 September 2003)Vigna, Giovanni; Jonsson, Erland; Kruegel, Chirstopher et al.Lecture notes in computer science. 2003, issn 0302-9743, isbn 3-540-40878-9, X, 237 p, isbn 3-540-40878-9Conference Proceedings

RAID 2002 : recent advances in intrusion detection (Zurich, 16-18 October 2002)Wespi, Andreas; Vigna, Giovanni; Deri, Luca et al.Lecture notes in computer science. 2002, issn 0302-9743, isbn 3-540-00020-8, X, 326 p, isbn 3-540-00020-8Conference Proceedings

Analytical methodologies for the determination of nitroimidazole residues in biological and environmental liquid samples: A reviewMAHUGO-SANTANA, Cristina; SOSA-FERRERA, Zoraida; TORRES-PADRON, Ma Esther et al.Analytica chimica acta. 2010, Vol 665, Num 2, pp 113-122, issn 0003-2670, 10 p.Article

A stereo vision-based obstacle detection system in vehiclesHUH, Kunsoo; PARK, Jaehak; HWANG, Junyeon et al.Optics and lasers in engineering. 2008, Vol 46, Num 2, pp 168-178, issn 0143-8166, 11 p.Article

Effects of feedback on active fault detectionALIREZA ESNA ASHARI; NIKOUKHAH, Ramine; CAMPBELL, Stephen L et al.Automatica (Oxford). 2012, Vol 48, Num 5, pp 866-872, issn 0005-1098, 7 p.Article

High-temperature liquid chromatography. Part I. Determination of the vapour pressures of binary solvent mixtures―Implications for liquid chromatographic separationsTEUTENBERG, T; WAGNER, P; GMEHLING, J et al.Journal of chromatography. 2009, Vol 1216, Num 37, pp 6471-6480, issn 0021-9673, 10 p.Article

Unintended invitation : Organizational Wi-Fi use by external roaming usersSIPIOR, Janice C; WARD, Burke T.Communications of the ACM. 2007, Vol 50, Num 8, pp 72-77, issn 0001-0782, 6 p.Article

Undermining an anomaly-based intrusion detection system using common exploitsTAN, Kymie M. C; KILLOURHY, Kevin S; MAXION, Roy A et al.Lecture notes in computer science. 2002, pp 54-73, issn 0302-9743, isbn 3-540-00020-8, 20 p.Conference Paper

La détection d'intrusions : les outils doivent coopérer : La sécurité des systèmes d'information = The intrusion detection: the tools have to cooperateVIE, Ludovic; MARRAKCHI, Zakia; MICHEL, Cédric et al.REE. Revue de l'électricité et de l'électronique. 2001, Num 5, pp 56-59, issn 1265-6534Article

Data mining, intrusion detection, information assurance, and data networks security 2008 (17-18 March 2008, Orlando, Florida, USA)Dasarathy, Belur V.Proceedings of SPIE, the International Society for Optical Engineering. 2008, Vol 6973, issn 0277-786X, isbn 978-0-8194-7164-2 0-8194-7164-X, 1 v. (various pagings), isbn 978-0-8194-7164-2 0-8194-7164-XConference Proceedings

Protecting security policies in ubiquitous environments using one-way functionsKVARNSTRÖM, Hakan; HEDBOM, Hans; JONSSON, Erland et al.Lecture notes in computer science. 2004, pp 71-85, issn 0302-9743, isbn 3-540-20887-9, 15 p.Conference Paper

Analyzing intensive intrusion alerts via correlationPENG NING; YUN CUI; REEVES, Douglas S et al.Lecture notes in computer science. 2002, pp 74-94, issn 0302-9743, isbn 3-540-00020-8, 21 p.Conference Paper

E-mail worm detection using the analysis of behaviorTAO JIANG; KIM, Wonil; LHEE, Kyungsuk et al.Lecture notes in computer science. 2005, pp 348-356, issn 0302-9743, isbn 3-540-30999-3, 1Vol, 9 p.Conference Paper

A generic model and architecture for automated auditingHASAN; STILLER, Burkhard.Lecture notes in computer science. 2005, pp 121-132, issn 0302-9743, isbn 3-540-29388-4, 1Vol, 12 p.Conference Paper

Why the first glass of wine is better than the seventhBERSINI, Hugues.Lecture notes in computer science. 2005, pp 100-111, issn 0302-9743, isbn 3-540-28175-4, 12 p.Conference Paper

Detecting malicious software by monitoring anomalous Windows registry accessesAPAP, Frank; HONIG, Andrew; HERSHKOP, Shlomo et al.Lecture notes in computer science. 2002, pp 36-53, issn 0302-9743, isbn 3-540-00020-8, 18 p.Conference Paper

Data mining, intrusion detection, information security and assurance, and data networks security 2009 (15-16 April 2009, Orlando, Florida, United States)Dasarathy, Belur V.Proceedings of SPIE, the International Society for Optical Engineering. 2009, Vol 7344, issn 0277-786X, isbn 978-0-8194-7610-4 0-8194-7610-2, 1Vol, various pagings, isbn 978-0-8194-7610-4 0-8194-7610-2Conference Proceedings

Data mining, intrusion detection, information assurance, and data networks security 2006 (17-18 April 2006, Kissimmee, Florida, USA)Dasarathy, Belur V.Proceedings of SPIE, the International Society for Optical Engineering. 2006, issn 0277-786X, isbn 0-8194-6297-7, 1Vol, various pagings, isbn 0-8194-6297-7Conference Proceedings

Mathematical models of the covert channelsGRUSHO, Alexander.Lecture notes in computer science. 2001, pp 15-20, issn 0302-9743, isbn 3-540-42103-3Conference Paper

Capturing an intruder in the pyramidSHAREGHI, Pooya; IMANI, Navid; SARBAZI-AZAD, Hamid et al.Lecture notes in computer science. 2006, pp 580-590, issn 0302-9743, isbn 3-540-34166-8, 1Vol, 11 p.Conference Paper

Using attack trees to identify malicious attacks from authorized insidersRAY, Indrajit; POOLSAPASSIT, Nayot.Lecture notes in computer science. 2005, pp 231-246, issn 0302-9743, isbn 3-540-28963-1, 1Vol, 16 p.Conference Paper

RAID 2004 : recent advances in intreusion detection (Sophia Antipolis, 15-17 September 2004)Jonsson, Erland; Valdes, Alfonso; Almgren, Magnus et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-23123-4, XII, 314 p, isbn 3-540-23123-4Conference Proceedings

Security and privacy (Berkeley CA, 12-15 May 2002)Proceedings - IEEE Symposium on Security and Privacy. 2002, issn 1081-6011, isbn 0-7695-1543-6, IX, 295 p, isbn 0-7695-1543-6Conference Proceedings

Representation of weather and terrain effects on intrusion detectionPECK, Lindamae.International Carnahan conference on security technology. 2002, pp 179-190, isbn 0-7803-7436-3, 12 p.Conference Paper

  • Page / 55