"Intrusion-detection for incident-response, using a military ..."

Jim Yuill et al. (2000)

Details and statistics

DOI: 10.1016/S1389-1286(00)00142-0

access: closed

type: Journal Article

metadata version: 2020-02-19

a service of  Schloss Dagstuhl - Leibniz Center for Informatics