"The Use of Data Mining in the Implementation of a Network Intrusion ..."

John Sheppard, Joe Carthy, John Dunnion (2005)

Details and statistics

DOI:

access: unavailable

type: Conference or Workshop Paper

metadata version: 2022-10-04

a service of  Schloss Dagstuhl - Leibniz Center for Informatics