ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
2
views
8
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,558
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computational Intelligence in Security for Information Systems 2010
Semi-supervised Fingerprinting of Protocol Messages
other
Author(s):
Jérôme François
,
Humberto Abdelnur
,
Radu State
,
Olivier Festor
Publication date
(Print):
2010
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
OncoTargets and Therapy
Most cited references
8
Record
: found
Abstract
: not found
Article
: not found
Assessing the accuracy of prediction algorithms for classification: an overview
P. Baldi
,
S. Brunak
,
Y Chauvin
…
(2000)
0
comments
Cited
138
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Report
: not found
SIP: Session Initiation Protocol
J. Rosenberg
,
H. Schulzrinne
,
G. Camarillo
…
(2002)
0
comments
Cited
92
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Polynomial-time metrics for attributed trees
D. Hidovic-Rowe
,
A Torsello
,
M Pelillo
(2005)
0
comments
Cited
16
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2010
Pages
: 107-115
DOI:
10.1007/978-3-642-16626-6_12
SO-VID:
b0c21800-746a-4ffa-b418-0c5ab5c20f9d
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
An Incremental Density-Based Clustering Technique for Large Datasets
pp. 13
BSDT ROC and Cognitive Learning Hypothesis
pp. 25
Evolving Fuzzy Classifier for Data Mining - an Information Retrieval Approach
pp. 33
Mereotopological Analysis of Formal Concepts in Security Ontologies
pp. 43
A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing Environment
pp. 51
A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queries
pp. 61
Incorporating Temporal Constraints in the Analysis Task of a Hybrid Intelligent IDS
pp. 73
Performances of Speech Signal Biometric Systems Based on Signal to Noise Ratio Degradation
pp. 81
Lipreading Using n–Gram Feature Vector
pp. 89
Face Processing for Security: A Short Review
pp. 99
Ontologies-Based Automated Intrusion Response System
pp. 107
Semi-supervised Fingerprinting of Protocol Messages
pp. 117
Monitoring of Spatial-Aggregated IP-Flow Records
pp. 125
Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysis
pp. 135
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks
pp. 143
An SLA-Based Approach for Network Anomaly Detection
pp. 151
Understanding Honeypot Data by an Unsupervised Neural Visualization
pp. 163
Permuted Image DCT Watermarking
pp. 173
A Developed WaterMark Technique for Distributed Database Security
pp. 183
Trident, a New Pseudo Random Number Generator Based on Coupled Chaotic Maps
pp. 191
The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market
pp. 203
A New Task Engineering Approach for Workflow Access Control
pp. 213
OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes
pp. 223
A Key Distribution Scheme for Live Streaming Multi-tree Overlays
pp. 231
Intelligent Methods for Scheduling in Transportation
Similar content
1,558
HPLC fingerprint spectrum and chemical pattern recognition of Radix Hedysari from different habitats of Gansu
Authors:
X.-j. Yang
,
X.-j. Yang
,
S Li
…
Orbital-dependent Fermi Surface shrinking as a fingerprint of nematicity in FeSe
Authors:
Laura Fanfarillo
,
Joseph Mansart
,
Pierre Toulemonde
…
WHAT INFLUENCES PEOPLE’S RESPONSES TO PUBLIC HEALTH MESSAGES FOR MANAGING RISKS AND PREVENTING DISEASE DURING PUBLIC HEALTH CRISES? A RAPID REVIEW OF THE EVIDENCE AND RECOMMENDATIONS
Authors:
Daniela Ghio
,
Sadie Lawes-Wickwar
,
Mei Yee Tang
…
See all similar