![]() |
| 2002 | ||
|---|---|---|
| 2 | Essam M. Hamed, James H. Graham: Fuzzy Threat Evaluation in Computer Security. Computers and Their Applications 2002: 389-393 | |
| 2001 | ||
| 1 | Essam M. Hamed, James H. Graham, Adel Said Elmaghraby: Computer Systems Threat Evaluation: An Agent-based and Fuzzy Logic Intrusion Detection Architecture. ISCA Conference on Intelligent Systems 2001: 23-26 | |
| 1 | Adel Said Elmaghraby | [1] |
| 2 | James H. Graham | [1] [2] |