dblp.uni-trier.dewww.uni-trier.de

Martin Botha

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
5EERobert Goss, Martin Botha, Rossouw von Solms: Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. SAICSIT Conf. 2007: 29-35
2004
4EEMartin Botha: Utilizing Neural Networks For Effective Intrusion Detection. ISSA 2004: 1-15
2003
3EEMartin Botha, Rossouw von Solms: Utilising fuzzy logic and trend analysis for effective intrusion detection. Computers & Security 22(5): 423-434 (2003)
2002
2EEMartin Botha, Rossouw von Solms: The utilization of trend analysis in the effective monitoring of information security. Part 2: the model. Inf. Manag. Comput. Security 10(1): 5-11 (2002)
2001
1EEMartin Botha, Rossouw von Solms: The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept. Inf. Manag. Comput. Security 9(5): 237-242 (2001)

Coauthor Index

1Robert Goss [5]
2Rossouw von Solms [1] [2] [3] [5]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)