6 results on '"Eskin E"'
Search Results
2. COMBINING TEXT MINING AND SEQUENCE ANALYSIS TO DISCOVER PROTEIN FUNCTIONAL REGIONS
3. Data mining methods for detection of new malicious executables.
4. Data mining methods for detection of new malicious executables
5. Modeling system calls for intrusion detection with dynamic window sizes.
6. Real time data mining-based intrusion detection.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.