![]() |
| 2007 | ||
|---|---|---|
| 5 | EE | Robert Goss, Martin Botha, Rossouw von Solms: Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. SAICSIT Conf. 2007: 29-35 |
| 2004 | ||
| 4 | EE | Martin Botha: Utilizing Neural Networks For Effective Intrusion Detection. ISSA 2004: 1-15 |
| 2003 | ||
| 3 | EE | Martin Botha, Rossouw von Solms: Utilising fuzzy logic and trend analysis for effective intrusion detection. Computers & Security 22(5): 423-434 (2003) |
| 2002 | ||
| 2 | EE | Martin Botha, Rossouw von Solms: The utilization of trend analysis in the effective monitoring of information security. Part 2: the model. Inf. Manag. Comput. Security 10(1): 5-11 (2002) |
| 2001 | ||
| 1 | EE | Martin Botha, Rossouw von Solms: The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept. Inf. Manag. Comput. Security 9(5): 237-242 (2001) |
| 1 | Robert Goss | [5] |
| 2 | Rossouw von Solms | [1] [2] [3] [5] |