An efficient network intrusion detection
Autor*in: |
Weigle, Michele C. [verfasserIn] |
---|
Format: |
Artikel |
---|
Erschienen: |
2010 |
---|
Umfang: |
8 |
---|
Übergeordnetes Werk: |
Enthalten in: Computer communications - Amsterdam : Elsevier, 1978, 33(2010), 4 vom: 1. März, Seite 477-485 |
---|---|
Übergeordnetes Werk: |
volume:33 ; year:2010 ; number:4 ; day:1 ; month:03 ; pages:477-485 ; extent:8 |
Katalog-ID: |
OLC183515817X |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC183515817X | ||
003 | DE-627 | ||
005 | 20220216181150.0 | ||
007 | tu | ||
008 | 100209s2010 xx ||||| 00| ||und c | ||
028 | 5 | 2 | |a sw100208_1 |
035 | |a (DE-627)OLC183515817X | ||
035 | |a (DE-599)GBVOLC183515817X | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
082 | 0 | 4 | |a 004 |
084 | |a 54.00 |2 bkl | ||
100 | 1 | |a Weigle, Michele C. |e verfasserin |4 aut | |
245 | 1 | 3 | |a An efficient network intrusion detection |
264 | 1 | |c 2010 | |
300 | |a 8 | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
700 | 1 | |a Cheng, Li |4 oth | |
700 | 1 | |a Kaur, Jasleen |4 oth | |
700 | 1 | |a Kulkarni, V. |4 oth | |
773 | 0 | 8 | |i Enthalten in |t Computer communications |d Amsterdam : Elsevier, 1978 |g 33(2010), 4 vom: 1. März, Seite 477-485 |w (DE-627)13003973X |w (DE-600)429664-3 |w (DE-576)015581349 |x 0140-3664 |7 nnns |
773 | 1 | 8 | |g volume:33 |g year:2010 |g number:4 |g day:1 |g month:03 |g pages:477-485 |g extent:8 |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a SSG-OLC-MKW | ||
912 | |a SSG-OLC-BUB | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_2006 | ||
912 | |a GBV_ILN_2009 | ||
912 | |a GBV_ILN_2016 | ||
912 | |a GBV_ILN_4247 | ||
912 | |a GBV_ILN_4307 | ||
936 | b | k | |a 54.00 |q AVZ |
951 | |a AR | ||
952 | |d 33 |j 2010 |e 4 |b 1 |c 3 |h 477-485 |g 8 |
author_variant |
m c w mc mcw |
---|---|
matchkey_str |
article:01403664:2010----::nfiinntoknrso |
hierarchy_sort_str |
2010 |
bklnumber |
54.00 |
publishDate |
2010 |
allfields |
sw100208_1 (DE-627)OLC183515817X (DE-599)GBVOLC183515817X DE-627 ger DE-627 rakwb 004 54.00 bkl Weigle, Michele C. verfasserin aut An efficient network intrusion detection 2010 8 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Cheng, Li oth Kaur, Jasleen oth Kulkarni, V. oth Enthalten in Computer communications Amsterdam : Elsevier, 1978 33(2010), 4 vom: 1. März, Seite 477-485 (DE-627)13003973X (DE-600)429664-3 (DE-576)015581349 0140-3664 nnns volume:33 year:2010 number:4 day:1 month:03 pages:477-485 extent:8 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-MKW SSG-OLC-BUB GBV_ILN_22 GBV_ILN_70 GBV_ILN_2006 GBV_ILN_2009 GBV_ILN_2016 GBV_ILN_4247 GBV_ILN_4307 54.00 AVZ AR 33 2010 4 1 3 477-485 8 |
spelling |
sw100208_1 (DE-627)OLC183515817X (DE-599)GBVOLC183515817X DE-627 ger DE-627 rakwb 004 54.00 bkl Weigle, Michele C. verfasserin aut An efficient network intrusion detection 2010 8 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Cheng, Li oth Kaur, Jasleen oth Kulkarni, V. oth Enthalten in Computer communications Amsterdam : Elsevier, 1978 33(2010), 4 vom: 1. März, Seite 477-485 (DE-627)13003973X (DE-600)429664-3 (DE-576)015581349 0140-3664 nnns volume:33 year:2010 number:4 day:1 month:03 pages:477-485 extent:8 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-MKW SSG-OLC-BUB GBV_ILN_22 GBV_ILN_70 GBV_ILN_2006 GBV_ILN_2009 GBV_ILN_2016 GBV_ILN_4247 GBV_ILN_4307 54.00 AVZ AR 33 2010 4 1 3 477-485 8 |
allfields_unstemmed |
sw100208_1 (DE-627)OLC183515817X (DE-599)GBVOLC183515817X DE-627 ger DE-627 rakwb 004 54.00 bkl Weigle, Michele C. verfasserin aut An efficient network intrusion detection 2010 8 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Cheng, Li oth Kaur, Jasleen oth Kulkarni, V. oth Enthalten in Computer communications Amsterdam : Elsevier, 1978 33(2010), 4 vom: 1. März, Seite 477-485 (DE-627)13003973X (DE-600)429664-3 (DE-576)015581349 0140-3664 nnns volume:33 year:2010 number:4 day:1 month:03 pages:477-485 extent:8 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-MKW SSG-OLC-BUB GBV_ILN_22 GBV_ILN_70 GBV_ILN_2006 GBV_ILN_2009 GBV_ILN_2016 GBV_ILN_4247 GBV_ILN_4307 54.00 AVZ AR 33 2010 4 1 3 477-485 8 |
allfieldsGer |
sw100208_1 (DE-627)OLC183515817X (DE-599)GBVOLC183515817X DE-627 ger DE-627 rakwb 004 54.00 bkl Weigle, Michele C. verfasserin aut An efficient network intrusion detection 2010 8 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Cheng, Li oth Kaur, Jasleen oth Kulkarni, V. oth Enthalten in Computer communications Amsterdam : Elsevier, 1978 33(2010), 4 vom: 1. März, Seite 477-485 (DE-627)13003973X (DE-600)429664-3 (DE-576)015581349 0140-3664 nnns volume:33 year:2010 number:4 day:1 month:03 pages:477-485 extent:8 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-MKW SSG-OLC-BUB GBV_ILN_22 GBV_ILN_70 GBV_ILN_2006 GBV_ILN_2009 GBV_ILN_2016 GBV_ILN_4247 GBV_ILN_4307 54.00 AVZ AR 33 2010 4 1 3 477-485 8 |
allfieldsSound |
sw100208_1 (DE-627)OLC183515817X (DE-599)GBVOLC183515817X DE-627 ger DE-627 rakwb 004 54.00 bkl Weigle, Michele C. verfasserin aut An efficient network intrusion detection 2010 8 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Cheng, Li oth Kaur, Jasleen oth Kulkarni, V. oth Enthalten in Computer communications Amsterdam : Elsevier, 1978 33(2010), 4 vom: 1. März, Seite 477-485 (DE-627)13003973X (DE-600)429664-3 (DE-576)015581349 0140-3664 nnns volume:33 year:2010 number:4 day:1 month:03 pages:477-485 extent:8 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-MKW SSG-OLC-BUB GBV_ILN_22 GBV_ILN_70 GBV_ILN_2006 GBV_ILN_2009 GBV_ILN_2016 GBV_ILN_4247 GBV_ILN_4307 54.00 AVZ AR 33 2010 4 1 3 477-485 8 |
source |
Enthalten in Computer communications 33(2010), 4 vom: 1. März, Seite 477-485 volume:33 year:2010 number:4 day:1 month:03 pages:477-485 extent:8 |
sourceStr |
Enthalten in Computer communications 33(2010), 4 vom: 1. März, Seite 477-485 volume:33 year:2010 number:4 day:1 month:03 pages:477-485 extent:8 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Computer communications |
authorswithroles_txt_mv |
Weigle, Michele C. @@aut@@ Cheng, Li @@oth@@ Kaur, Jasleen @@oth@@ Kulkarni, V. @@oth@@ |
publishDateDaySort_date |
2010-03-01T00:00:00Z |
hierarchy_top_id |
13003973X |
dewey-sort |
14 |
id |
OLC183515817X |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC183515817X</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220216181150.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">100209s2010 xx ||||| 00| ||und c</controlfield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">sw100208_1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC183515817X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC183515817X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Weigle, Michele C.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="3"><subfield code="a">An efficient network intrusion detection</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">8</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cheng, Li</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaur, Jasleen</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kulkarni, V.</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Computer communications</subfield><subfield code="d">Amsterdam : Elsevier, 1978</subfield><subfield code="g">33(2010), 4 vom: 1. März, Seite 477-485</subfield><subfield code="w">(DE-627)13003973X</subfield><subfield code="w">(DE-600)429664-3</subfield><subfield code="w">(DE-576)015581349</subfield><subfield code="x">0140-3664</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:33</subfield><subfield code="g">year:2010</subfield><subfield code="g">number:4</subfield><subfield code="g">day:1</subfield><subfield code="g">month:03</subfield><subfield code="g">pages:477-485</subfield><subfield code="g">extent:8</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2016</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4247</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">33</subfield><subfield code="j">2010</subfield><subfield code="e">4</subfield><subfield code="b">1</subfield><subfield code="c">3</subfield><subfield code="h">477-485</subfield><subfield code="g">8</subfield></datafield></record></collection>
|
author |
Weigle, Michele C. |
spellingShingle |
Weigle, Michele C. ddc 004 bkl 54.00 An efficient network intrusion detection |
authorStr |
Weigle, Michele C. |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)13003973X |
format |
Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0140-3664 |
topic_title |
004 54.00 bkl An efficient network intrusion detection |
topic |
ddc 004 bkl 54.00 |
topic_unstemmed |
ddc 004 bkl 54.00 |
topic_browse |
ddc 004 bkl 54.00 |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
author2_variant |
l c lc j k jk v k vk |
hierarchy_parent_title |
Computer communications |
hierarchy_parent_id |
13003973X |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
Computer communications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)13003973X (DE-600)429664-3 (DE-576)015581349 |
title |
An efficient network intrusion detection |
ctrlnum |
(DE-627)OLC183515817X (DE-599)GBVOLC183515817X |
title_full |
An efficient network intrusion detection |
author_sort |
Weigle, Michele C. |
journal |
Computer communications |
journalStr |
Computer communications |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2010 |
contenttype_str_mv |
txt |
container_start_page |
477 |
author_browse |
Weigle, Michele C. |
container_volume |
33 |
physical |
8 |
class |
004 54.00 bkl |
format_se |
Aufsätze |
author-letter |
Weigle, Michele C. |
dewey-full |
004 |
title_sort |
efficient network intrusion detection |
title_auth |
An efficient network intrusion detection |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-MKW SSG-OLC-BUB GBV_ILN_22 GBV_ILN_70 GBV_ILN_2006 GBV_ILN_2009 GBV_ILN_2016 GBV_ILN_4247 GBV_ILN_4307 |
container_issue |
4 |
title_short |
An efficient network intrusion detection |
remote_bool |
false |
author2 |
Cheng, Li Kaur, Jasleen Kulkarni, V. |
author2Str |
Cheng, Li Kaur, Jasleen Kulkarni, V. |
ppnlink |
13003973X |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth |
up_date |
2024-07-03T21:25:49.051Z |
_version_ |
1803594706770198528 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC183515817X</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220216181150.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">100209s2010 xx ||||| 00| ||und c</controlfield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">sw100208_1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC183515817X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC183515817X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Weigle, Michele C.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="3"><subfield code="a">An efficient network intrusion detection</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">8</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cheng, Li</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaur, Jasleen</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kulkarni, V.</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Computer communications</subfield><subfield code="d">Amsterdam : Elsevier, 1978</subfield><subfield code="g">33(2010), 4 vom: 1. März, Seite 477-485</subfield><subfield code="w">(DE-627)13003973X</subfield><subfield code="w">(DE-600)429664-3</subfield><subfield code="w">(DE-576)015581349</subfield><subfield code="x">0140-3664</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:33</subfield><subfield code="g">year:2010</subfield><subfield code="g">number:4</subfield><subfield code="g">day:1</subfield><subfield code="g">month:03</subfield><subfield code="g">pages:477-485</subfield><subfield code="g">extent:8</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2016</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4247</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">33</subfield><subfield code="j">2010</subfield><subfield code="e">4</subfield><subfield code="b">1</subfield><subfield code="c">3</subfield><subfield code="h">477-485</subfield><subfield code="g">8</subfield></datafield></record></collection>
|
score |
7.3979864 |