Search alternatives:
detect novelty » detect novel, patent novelty, desserts novelty
detect covert » detecting covert, detect concept, detect connect
debold novel » beyond novel, second novel
debut novel » detect novel

1
Published 2003
Springer US
Table of Contents: ...Mismatch Negativity -- 1 Auditory Environment and Change Detection as Indexed by the Mismatch...

2
Published 2000
Birkhäuser
Table of Contents: ...-processing enzymes -- Cytokine-neutralizing therapeutic antibodies -- The debut of anti-TNF therapy...

3
by Ekbal, Asif, Kumari, Rina
Published 2024
Springer Nature Switzerland
Table of Contents: ...1. Introduction -- 2. Recent Advancements in Misinformation Detection -- 3. Novelty and Emotion...

4
Published 2001
Springer Berlin Heidelberg
Table of Contents: ... with Intrusion Detection Systems -- IDS Cooperation -- Probabilistic Alert Correlation -- Designing a Web...

5
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... -- Exploiting Temporal Persistence to Detect Covert Botnet Channels -- Posters -- An Experimental Study...

6
Published 2008
Springer Berlin Heidelberg
Table of Contents: ...Alert Correlation and Worm Detection -- Optimal Cost, Collaborative, and Distributed Response...

7
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...Worm Detection and Containment (I) -- Virtual Playgrounds for Worm Behavior Investigation...

8
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Policy -- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks...

9
by Narlikar, Jayant V.
Published 2015
Springer International Publishing
Table of Contents: ...Preface -- Part I Short Story: The Rare Idol of Ganesha -- Part II Novel: The Return of Vaman...

10
by Marchette, David J.
Published 2001
Springer New York
Table of Contents: ... Monitoring -- 6 Computer Viruses and Worms -- 7 Trojan Programs and Covert Channels -- Appendix A WellKnown...

11
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Host Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code...

12
Published 2014
Springer International Publishing
Table of Contents: ... Forensics.- Instruction-Level Steganography for Covert Trigger-Based Malware -- AndRadar: Fast Discovery...

13
Published 2020
Springer International Publishing
Table of Contents: ... -- Distributed Heterogeneous N-Variant Execution -- Sec2graph:Network Attack Detection based on Novelty Detection...

14
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Obfuscated Code Detection -- Analyzing Memory Accesses in Obfuscated x86 Executables -- Hybrid...

15
by Salerno, Vincenzo
Published 2022
FedOA - Federico II University Press
Subjects: ...novel...

16
by Mihailova, Mihaela
Published 2021
Bloomsbury Academic
Subjects: ...graphic novel...

17
by Dunton, John
Published 1713
printed for the author, and sold by J. Baker, in Pater-Noster-row, and by most booksellers in London and Westminster

18
by Alla, Sridhar, Adari, Suman Kalyan
Published 2019
Apress
Table of Contents: ...; Novelty Detection; The Three Styles of Anomaly Detection; Where Is Anomaly Detection Used?; Data Breaches...

19
by Megías, David
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...propaganda detection...

20
by Dvorák, Marta
Published 2004
University of Ottawa Press / Les Presses de l’Université d’Ottawa
Subjects: ...novels...