Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-4
|
Results: 4
Computer intrusion: Detecting masquerades
Authors:
Schonlau, M DuMouchel, W Ju, WH Karr, AF Theus, M Vardi, Y
Citation:
M. Schonlau et al., Computer intrusion: Detecting masquerades, STAT SCI, 16(1), 2001, pp. 58-74
Detecting masquerades in intrusion detection based on unpopular commands
Authors:
Schonlau, M Theus, M
Citation:
M. Schonlau et M. Theus, Detecting masquerades in intrusion detection based on unpopular commands, INF PROCESS, 76(1-2), 2000, pp. 33-38
Sensitivity analysis of computer models: World Bank HDM-III model
Authors:
Mrawira, D Welch, WJ Schonlau, M Haas, R
Citation:
D. Mrawira et al., Sensitivity analysis of computer models: World Bank HDM-III model, J TRANSP E, 125(5), 1999, pp. 421-428
Efficient global optimization of expensive black-box functions
Authors:
Jones, DR Schonlau, M Welch, WJ
Citation:
Dr. Jones et al., Efficient global optimization of expensive black-box functions, J GLOB OPT, 13(4), 1998, pp. 455-492
Risultati:
1-4
|