"Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits."

Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion (2002)

Details and statistics

DOI: 10.1007/3-540-36084-0_4

access: closed

type: Conference or Workshop Paper

metadata version: 2019-08-08

a service of  Schloss Dagstuhl - Leibniz Center for Informatics