2007 | ||
---|---|---|
5 | EE | Robert Goss, Martin Botha, Rossouw von Solms: Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. SAICSIT Conf. 2007: 29-35 |
2004 | ||
4 | EE | Martin Botha: Utilizing Neural Networks For Effective Intrusion Detection. ISSA 2004: 1-15 |
2003 | ||
3 | EE | Martin Botha, Rossouw von Solms: Utilising fuzzy logic and trend analysis for effective intrusion detection. Computers & Security 22(5): 423-434 (2003) |
2002 | ||
2 | EE | Martin Botha, Rossouw von Solms: The utilization of trend analysis in the effective monitoring of information security. Part 2: the model. Inf. Manag. Comput. Security 10(1): 5-11 (2002) |
2001 | ||
1 | EE | Martin Botha, Rossouw von Solms: The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept. Inf. Manag. Comput. Security 9(5): 237-242 (2001) |
1 | Robert Goss | [5] |
2 | Rossouw von Solms | [1] [2] [3] [5] |