Self-organizing maps in computer security
| Main Authors: | , |
|---|---|
| Other Authors: | |
| Format: | Book Section |
| Published: |
Nova Science
2009
|
| Online Access: | https://eprints.nottingham.ac.uk/34115/ |
| _version_ | 1848794778419855360 |
|---|---|
| author | Feyereisl, Jan Aickelin, Uwe |
| author2 | Hopkins, Ronald D. |
| author_facet | Hopkins, Ronald D. Feyereisl, Jan Aickelin, Uwe |
| author_sort | Feyereisl, Jan |
| building | Nottingham Research Data Repository |
| collection | Online Access |
| first_indexed | 2025-11-14T19:21:36Z |
| format | Book Section |
| id | nottingham-34115 |
| institution | University of Nottingham Malaysia Campus |
| institution_category | Local University |
| last_indexed | 2025-11-14T19:21:36Z |
| publishDate | 2009 |
| publisher | Nova Science |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | nottingham-341152020-05-04T16:28:04Z https://eprints.nottingham.ac.uk/34115/ Self-organizing maps in computer security Feyereisl, Jan Aickelin, Uwe Nova Science Hopkins, Ronald D. Tokere, Wesley P. 2009-01-01 Book Section PeerReviewed Feyereisl, Jan and Aickelin, Uwe (2009) Self-organizing maps in computer security. In: Self-organizing maps in computer security: intrusion, detection and prevention. Nova Science, New York, USA, pp. 1-30. ISBN 9781606927816 |
| spellingShingle | Feyereisl, Jan Aickelin, Uwe Self-organizing maps in computer security |
| title | Self-organizing maps in computer security |
| title_full | Self-organizing maps in computer security |
| title_fullStr | Self-organizing maps in computer security |
| title_full_unstemmed | Self-organizing maps in computer security |
| title_short | Self-organizing maps in computer security |
| title_sort | self-organizing maps in computer security |
| url | https://eprints.nottingham.ac.uk/34115/ |