Network security through artificial immunity with SANAHilker, Michael ![]() Doctoral thesis (2008) Detailed reference viewed: 251 (94 UL)![]() Service Oriented Architecture in Network Security - a novel Organisation in Security SystemsHilker, Michael ; Schommer, Christoph ![]() in Abstract book of 3rd International Workshop on Theory of Computer Viruses (TCV 2008) (2008) Detailed reference viewed: 102 (3 UL)![]() Symbolic Computing with Incremental Mind-maps to Manage and Mine Data Streams - Some ApplicationsBrucks, Claudine ; Hilker, Michael ; Schommer, Christoph et alin Abstract book of 4th International Workshop on Neural-Symbolic Learning and Reasoning (NeSy'08). ECAI 2008. (2008) Detailed reference viewed: 112 (6 UL)![]() Semi-automated Content Zoning of Spam EmailsBrucks, Claudine ; Hilker, Michael ; Schommer, Christoph et alin Proceedings "WebIst" (2007) Detailed reference viewed: 175 (3 UL)![]() Semi-automated Content Zoning of Spam EmailsBrucks, Claudine ; Hilker, Michael ; Schommer, Christoph et alin Lecture Notes on Business Information Processing. Web Information Systems and Technologies (2007) Detailed reference viewed: 176 (2 UL)![]() SANA - Network Protection through artificial ImmunityHilker, Michael ; Schommer, Christoph ![]() in Abstract book of 2nd International Workshop on Theory of Computer Viruses (TCV 2007) (2007) Detailed reference viewed: 135 (6 UL)![]() AGNOSCO - Identification of Infected Nodes with artificial Ant ColoniesHilker, Michael ; Schommer, Christoph ![]() in Abstract book of 6th International Conference on Recent Advances in Soft Computing (RASC 2006) (2006) Detailed reference viewed: 91 (2 UL) AGNOSCO - Identification of Infected Nodes with artificial Ant ColoniesHilker, Michael ; Schommer, Christoph ![]() Book (2006) Detailed reference viewed: 89 (2 UL)![]() SANA - Security Analysis in Internet Traffic through Artificial Immune SystemsHilker, Michael ; Schommer, Christoph ![]() in Technical Documentary Report. United States. Air Force. Systems Command. Electronic Systems Division (2006) Detailed reference viewed: 114 (5 UL)![]() Description of bad-signatures for Network Intrusion DetectionHilker, Michael ; Schommer, Christoph ![]() in Proceedings of the 4th. Australasian Information Security Workshop (AISW-NetSec 2006) (2006) Detailed reference viewed: 83 (2 UL)![]() A new queueing strategy for the Adversarial Queueing TheoryHilker, Michael ; Schommer, Christoph ![]() in IPSI-2005 (2005) Detailed reference viewed: 92 (0 UL) |
||