nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A unified data mining solution for authorship analysis in anonymous textual communications
|
Iqbal, Farkhund |
|
2013 |
231 |
C |
p. 98-112 15 p. |
artikel |
2 |
Guest editorial: Special issue on data mining for information security
|
Elovici, Yuval |
|
2013 |
231 |
C |
p. 1-3 3 p. |
artikel |
3 |
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining
|
Pinzón, Cristian I. |
|
2013 |
231 |
C |
p. 15-31 17 p. |
artikel |
4 |
In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS
|
Shahzad, Farrukh |
|
2013 |
231 |
C |
p. 45-63 19 p. |
artikel |
5 |
Inside Front Cover - Editorial Board
|
|
|
2013 |
231 |
C |
p. IFC- 1 p. |
artikel |
6 |
MP3 audio steganalysis
|
Qiao, Mengyu |
|
2013 |
231 |
C |
p. 123-134 12 p. |
artikel |
7 |
Opcode sequences as representation of executables for data-mining-based unknown malware detection
|
Santos, Igor |
|
2013 |
231 |
C |
p. 64-82 19 p. |
artikel |
8 |
Privacy-preserving disjunctive normal form operations on distributed sets
|
Chun, Ji Young |
|
2013 |
231 |
C |
p. 113-122 10 p. |
artikel |
9 |
Privacy-preserving trajectory data publishing by local suppression
|
Chen, Rui |
|
2013 |
231 |
C |
p. 83-97 15 p. |
artikel |
10 |
Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining
|
Huang, Jen-Yan |
|
2013 |
231 |
C |
p. 32-44 13 p. |
artikel |
11 |
Toward a more practical unsupervised anomaly detection system
|
Song, Jungsuk |
|
2013 |
231 |
C |
p. 4-14 11 p. |
artikel |