Neural networks applied in intrusion detection systems JM Bonifacio, AM Cansian, A De Carvalho, ES Moreira 1998 IEEE International Joint Conference on Neural Networks Proceedings …, 1998 | 132 | 1998 |
Network intrusion detection using neural networks A Cansian, ES Moreira, ACPLF Carvalho, JM Bonifácio Junior | 45 | 1997 |
An adaptive intrusion detection system using neural networks JM Bonifácio, ES Moreira, AM Cansian, A Carvalho na, 1997 | 35 | 1997 |
Desenvolvimento de um sistema adaptativo de detecção de intrusos em redes de computadores AM Cansian Universidade de São Paulo, 1997 | 33 | 1997 |
Saturation effects in degenerate four-wave mixing in ruby and GdAlO3:Cr+3 T Catunda, AM Cansian, JC Castro JOSA B 8 (4), 820-823, 1991 | 23 | 1991 |
MR-Radix: a multi-relational data mining algorithm CR Valêncio, FT Oyama, P Scarpelini Neto, AC Colombini, AM Cansian, ... Human-centric Computing and Information Sciences 2, 1-17, 2012 | 21 | 2012 |
ACPLF De Carvalho, and ES Moreira,“ JJM Bonifacio, AM Cansian Neural networks applied in intrusion detection systems,” in Proc. IEEE Int …, 1998 | 17 | 1998 |
Statistical model applied to netflow for network intrusion detection A Proto, LA Alexandre, ML Batista, IL Oliveira, AM Cansian Transactions on Computational Science XI: Special Issue on Security in …, 2010 | 14 | 2010 |
An attack signature model to computer security intrusion detection AM Cansian, ARA Da Silva, M De Souza MILCOM 2002. Proceedings 2, 1368-1373, 2002 | 13 | 2002 |
Malware distributed collection and pre-classification system using honeypot technology ARA Grégio, IL Oliveira, RDC Santos, AM Cansian, PL de Geus Data Mining, Intrusion Detection, Information Security and Assurance, and …, 2009 | 11 | 2009 |
Modelo de armazenamento de fluxos de rede para análises de tráfego e de segurança JL Corrêa, A Proto, AM Cansian Anais do VIII Simpósio Brasileiro de Segurança da Informação e de Sistemas …, 2008 | 11 | 2008 |
A malware detection system inspired on the human immune system IL De Oliveira, ARA Grégio, AM Cansian Computational Science and Its Applications–ICCSA 2012: 12th International …, 2012 | 9 | 2012 |
Method Based on Triangulation for Sensor Deployment on 3D Surfaces R Nespolo, LA Neves, G Roberto, M Ribeiro, MZ Do Nascimento, ... 2016 29th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI …, 2016 | 8 | 2016 |
An efficient parallel algorithm for multiple sequence similarities calculation using a low complexity method EA Marucci, GFD Zafalon, JC Momente, LA Neves, CR Valêncio, AR Pinto, ... BioMed research international 2014 (1), 563016, 2014 | 8 | 2014 |
Um modelo adaptativo para detecção de comportamento suspeito em redes de computadores AM Cansian, JM Bonifácio Júnior, ES Moreira, ACPLF Carvalho | 6 | 1997 |
A model for anomaly classification in intrusion detection systems VO Ferreira, VV Galhardi, LBL Gonçalves, RC Silva, AM Cansian Journal of Physics: Conference Series 633 (1), 012124, 2015 | 5 | 2015 |
Detecção de ataques de negativa de serviço por meio de fluxos de dados e sistemas inteligentes AM Cansian, JL Corrêa Anais do VII Simpósio Brasileiro em Segurança da Informação e de Sistemas …, 2007 | 5 | 2007 |
Conceitos para perícia forense computacional AM Cansian 6ª ESCOLA REGIONAL DE INFORMÁTICA DA SBC, 2001 | 5 | 2001 |
VDBSCAN+: performance optimization based on GPU parallelism CR Valêncio, GP Daniel, CA De Medeiros, AM Cansian, LC Baida, ... 2013 International Conference on Parallel and Distributed Computing …, 2013 | 4 | 2013 |
Developing an Attack Signature Standard– AM Cansian, M Souza, ARA Silva Proceedings of SAM'02-The 2002 International Conference on Security and …, 2002 | 4 | 2002 |