107 | -- | 139 | Wei Lu, Issa Traoré. Unsupervised anomaly detection using an evolutionary extension of k-means algorithm |
140 | -- | 174 | Lyes Khelladi, Yacine Challal, Abdelmadjid Bouabdallah, Nadjib Badache. On security issues in embedded systems: challenges and solutions |
175 | -- | 196 | Daniel O. Rice, Robert S. Garfinkel, Ram D. Gopal. CVC-STAR: Protecting data confidentiality while increasing flexibility and quality of responses |
197 | -- | 217 | Anindya Chakraborty, Manoj K. Garg, Arun K. Majumdar, Shamik Sural. Attack recovery from malicious transactions in distributed database systems |
218 | -- | 234 | Chien-Chuan Lin, Ming-Shi Wang. Genetic-clustering algorithm for intrusion detection system |