1. Detection of intrusions and malware, and vulnerability assessment
Author: / Klaus Julisch, Christopher Kruegel (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control--Congresses,Computers--Access control--Evaluation--Congresses,Computer networks--Security measures--Congresses,Computer security--Congresses,Intrusions,Malware,Vulnerability assessment,DIMVA
Classification :
QA
,
76
.
9
,.
A25
,
D563
,
2005


2. Detection of intrusions and malware, and vulnerability assessment : Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005 : proceedings
Author: Klaus Julisch, Christopher Kruegel )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computers -- Access control,Evaluation -- Congresses ، Computers -- Access control,Congresses ، Computer networks -- Security measures,Congresses ، Computer security
Classification :
QA
76
.
L28
Vol
.
3548


3. Intrusion Detection And Correlation Challenges
Author: / Christopher Kruegel, Fredrik Valeur, Giovanni Vigna
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ELECTRONIC& METHODS|ENGINEERING, ELECTRICAL & ARCHITECTURE|COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, SOFTWARE ENGINEERING|COMPUTER SCIENCE, THEORY &COMPUTER SCIENCE, HARDWARE
Classification :
E-BOOK

4. Intrusion detection and correlatio
Author: / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computer security,Electronic countermeasures
Classification :
TK5105
.
59
.
K78
2005


5. Intrusion detection and correlation
Author: / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computer security,Electronic countermeasures
Classification :
E-BOOK

6. Intrusion detection and correlation
Author: / by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer security.,Electronic countermeasures.
Classification :
TK
,
5105
.
59
,.
K78
,
2005


7. Intrusion detection and correlation :
Author: by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Electronic countermeasures.,Intrusion detection systems (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic countermeasures.,Electronic countermeasures.,Informatique.,Intrusion detection systems (Computer security)
Classification :
TK5105
.
59
.
K78
2005eb


8. Intrusion detection and correlation. challenges and solutions
Author: Kruegel, Christopher
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer networks -- Security measures,، Computer security,، Electronic countermeasures
Classification :
TK
5105
.
59
.
K78
2005


9. Recent advances in intrusion detection :
Author: Christopher Kruegel, Richard Lippmann, Andrew Clark (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computers-- Access control, Congresses.

10. Recent advances in intrusion detection
Author: / Giovanni Vigna, Erland Jonsson, Christopher Kruegel, eds
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computers--Access control--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
R34
,
2003


11. Recent advances in intrusion detection : 6th international symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003 : proceedings
Author: Giovanni Vigna, Erland Jonsson, Christopher Kruegel )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers -- Access control
Classification :
QA
76
.
L28
Vol
.
2820

