ACSAC   1998 Annual Computer Security Applications Conference
Wall of Fame | Most Viewed ACSAC-1998 Paper
10 years 5 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source180
2Download preprint from source152
3Download preprint from source150
4Download preprint from source150
5Download preprint from source133
6Download preprint from source131
7Download preprint from source124
8Download preprint from source121
9Download preprint from source116
10Download preprint from source112
11Download preprint from source105
12Download preprint from source103
13Download preprint from source100
14Download preprint from source98