![]() | ![]() |
2009 | ||
---|---|---|
5 | EE | Rachid Beghdad: Efficient deterministic method for detecting new U2R attacks. Computer Communications 32(6): 1104-1110 (2009) |
4 | EE | Rachid Beghdad: Modelling intrusion detection as an allocation problem. Pattern Recognition Letters 30(8): 774-779 (2009) |
2008 | ||
3 | EE | Rachid Beghdad: Critical study of neural networks in detecting intrusions. Computers & Security 27(5-6): 168-175 (2008) |
2004 | ||
2 | EE | Rachid Beghdad: Modelling and solving the intrusion detection problem in computer networks. Computers & Security 23(8): 687-696 (2004) |
2001 | ||
1 | EE | Yacine Bouzida, Rachid Beghdad: Improving the Timed Token Protocol. ICN (1) 2001: 520-529 |
1 | Yacine Bouzida | [1] |