Corpus ID: 50579233

See Blockindiscussions, Blockinstats, Blockinand Blockinauthor Blockinprofiles Blockinfor Blockinthis Blockinpublication

@inproceedings{Lourida2015SeeBB,
  title={See Blockindiscussions, Blockinstats, Blockinand Blockinauthor Blockinprofiles Blockinfor Blockinthis Blockinpublication},
  author={I. Lourida and Maya Soni and Joanna Thompson-Coon and N. Purandare and I. Lang and O. Ukoumunne and D. J. Llewellyn},
  year={2015}
}
  • I. Lourida, Maya Soni, +4 authors D. J. Llewellyn
  • Published 2015
  • On BLOCKINthe BLOCKINtheoretical BLOCKINbasis BLOCKINof BLOCKINperfusion measurements BLOCKINby BLOCKINdynamic BLOCKINsusceptibility contrast BLOCKINMRI 

    Figures and Tables from this paper

    References

    SHOWING 1-10 OF 971 REFERENCES
    Rampant software errors undermine scientific results.
    • 8
    • PDF
    Covert channels-here to stay?
    • I. Moskowitz, M. Kang
    • Computer Science
    • Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance
    • 1994
    • 154
    • PDF
    IP covert timing channels: design and detection
    • 421
    • PDF
    Using Naive Bayes with AdaBoost to Enhance Network Anomaly Intrusion Detection
    • W. Li, Qingxia Li
    • Computer Science
    • 2010 Third International Conference on Intelligent Networks and Intelligent Systems
    • 2010
    • 16
    Data mining - practical machine learning tools and techniques, Second Edition
    • 1,883
    • PDF
    Open and Free: Software and Scientific Reproducibility
    • 16
    CLUSTERING-BASED NETWORK INTRUSION DETECTION
    • 124
    • Highly Influential
    • PDF
    A detailed analysis of the KDD CUP 99 data set
    • 2,089
    • PDF