Understanding Intrusion Detection through Visualization More Books Like This

Machine Learning and Data Mining for Computer Security Machine Learning and Data Mining for Computer Security
2006
Managing Cyber Threats Managing Cyber Threats
2006
Information Security Applications Information Security Applications
2014
Deployable Machine Learning for Security Defense Deployable Machine Learning for Security Defense
2020
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2008
Data Analytics and Decision Support for Cybersecurity Data Analytics and Decision Support for Cybersecurity
2017
ICT Systems Security and Privacy Protection ICT Systems Security and Privacy Protection
2018
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2016
ICT Systems Security and Privacy Protection ICT Systems Security and Privacy Protection
2020
Engineering Secure Software and Systems Engineering Secure Software and Systems
2018
ICT Systems Security and Privacy Protection ICT Systems Security and Privacy Protection
2021
Risks and Security of Internet and Systems Risks and Security of Internet and Systems
2015
ICT Systems Security and Privacy Protection ICT Systems Security and Privacy Protection
2016
Secure IT Systems Secure IT Systems
2023
Future Challenges in Security and Privacy for Academia and Industry Future Challenges in Security and Privacy for Academia and Industry
2011