๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

[Lecture Notes in Computer Science] Computational Intelligence and Security Volume 4456 || Network Anomalous Attack Detection Based on Clustering and Classifier

โœ Scribed by Wang, Yuping; Cheung, Yiu-ming; Liu, Hailin


Book ID
120597039
Publisher
Springer Berlin Heidelberg
Year
2007
Weight
877 KB
Category
Article
ISBN
3540743774

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


[Lecture Notes in Computer Science] Comp
โœ Wang, Yuping; Cheung, Yiu-ming; Liu, Hailin ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ German โš– 437 KB

The Refereed Post-proceedings Of The International Conference On Computational Intelligence And Security Are Presented In This Volume. The 116 Papers Were Submitted To Two Rounds Of Careful Review. Papers Cover Bio-inspired Computing, Evolutionary Computation, Learning Systems And Multi-agents, Cryp

[Lecture Notes in Computer Science] Comp
โœ Wang, Yuping; Cheung, Yiu-ming; Liu, Hailin ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ German โš– 267 KB

The Refereed Post-proceedings Of The International Conference On Computational Intelligence And Security Are Presented In This Volume. The 116 Papers Were Submitted To Two Rounds Of Careful Review. Papers Cover Bio-inspired Computing, Evolutionary Computation, Learning Systems And Multi-agents, Cryp

[Lecture Notes in Computer Science] Comp
โœ Wang, Yuping; Cheung, Yiu-ming; Liu, Hailin ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ German โš– 980 KB

The Refereed Post-proceedings Of The International Conference On Computational Intelligence And Security Are Presented In This Volume. The 116 Papers Were Submitted To Two Rounds Of Careful Review. Papers Cover Bio-inspired Computing, Evolutionary Computation, Learning Systems And Multi-agents, Cryp