Author of the publication

A Pattern Matching Model for Misuse Intrusion Detection

, and . Proceedings of the 17th National Computer Security Conference, page 11--21. (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Ambulance Positioning for Road Accidents With Deep Embedded Clustering., , , , , , and . IEEE Access, (2023)Role of Protein Aggregation and Interactions between α-Synuclein and Calbindin in Parkinson's Disease., , , , , and . ICIC (2), volume 7996 of Lecture Notes in Computer Science, page 677-684. Springer, (2013)A Novel Hybrid Crossover based Artificial Bee Colony Algorithm for Optimization Problem., , and . CoRR, (2014)Online Financial Algorithms Competitive Analysis, and . CoRR, (2012)A Novel Hybrid Algorithm for Permutation Flow Shop Scheduling., and . CoRR, (2014)Mining message sequence graphs., , , and . ICSE, page 91-100. ACM, (2011)A novel soft computing method for engine RUL prediction., , and . Multimedia Tools Appl., 78 (4): 4065-4087 (2019)Quad-band unequal power divider with coupled line section using stepped-impedance transformers., and . ICACCI, page 2544-2548. IEEE, (2014)New Results and Techniques for Computation of Stored Energy in Lossless/All-Pass Systems., , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 64-I (1): 72-85 (2017)Numerical Study of the Generic Sports Utility Vehicle Design with a Drag Reduction Add-On Device., , , , , and . J. Comput. Eng., (2014)