schliessen

Filtern

 

Bibliotheken

9.

Masquerade detection using support vector machine
by Min, Yang

Wuhan University Journal of Natural Sciences, 2005, Vol.10(1), pp.103-106

11.

Building intrusion tolerant software system
by Wen-ling, Peng

Wuhan University Journal of Natural Sciences, 2005, Vol.10(1), pp.47-50

13.

Least trace extended set-membership filter
by Huang, Yi

Science China Information Sciences, 2010, Vol.53(2), pp.258-270

12

Recommended databases

Find more Articles matching your search terms in these recommended databases.

Filter electronic articles 35 Hits

Remove Filters