MISUSE DETECTION
Experts
- Weizhi Meng
- Wenjuan Li
- Ajith Abraham
- Xiapu Luo
- Emmanouil Vasilomanolakis
- Max Mühlhäuser
- Wenke Lee
- Abdallah Shami
- Mouhammd Alkasassbeh
- Ing-Ray Chen
- Giovanni Vigna
- Sung-Bae Cho
- Marco Vieira
- Hiroki Takakura
- Kim-Kwang Raymond Choo
- Danda B. Rawat
- George Kesidis
- Samuel Kounev
- Simon N. Foley
- Adel Bouhoula
- Naima Kaabouch
- Li Yang
- Uwe Aickelin
- Nazli Goharian
- Hichem Sedjelmaci
- Gürsel Serpen
- Yu Wang
- Abdallah Moubayed
- Tarek Abbes
- David J. Miller
- Nuno Antunes
- Yingxu Lai
- Carlos Garcia Cordero
- Steven Furnell
- Christopher Leckie
- Ming-Yang Su
- Zhi Xue
- Aleksandar Milenkoski
- Chung-Ming Ou
Venues
- CoRR
- IEEE Access
- RAID
- Sensors
- Comput. Secur.
- Wirel. Pers. Commun.
- Secur. Commun. Networks
- Recent Advances in Intrusion Detection
- Expert Syst. Appl.
- IEEE Internet Things J.
- Comput. Networks
- ARES
- Clust. Comput.
- GLOBECOM
- ACSAC
- Int. J. Distributed Sens. Networks
- Comput. Commun.
- NOMS
- J. Ambient Intell. Humaniz. Comput.
- ICCCNT
- Future Gener. Comput. Syst.
- Comput. Electr. Eng.
- IEEE Trans. Ind. Informatics
- SN Comput. Sci.
- Comput. Syst. Sci. Eng.
- J. Intell. Fuzzy Syst.
- Concurr. Comput. Pract. Exp.
- Neural Comput. Appl.
- IACR Cryptol. ePrint Arch.
- Future Internet
- Int. J. Inf. Sec.
- Security and Management
- Inf. Sci.
- IEEE Trans. Dependable Secur. Comput.
- IET Inf. Secur.
- ICMLA
- IAS
- ICC
- Int. J. Netw. Secur.
Related Topics
Related Keywords
Popularity