Login / Signup

A Two-Stage Process Based on Data Mining and Optimization to Identify False Positives and False Negatives Generated by Intrusion Detection Systems.

Fatma HachmiMohamed Limam
Published in: CIS (2015)
Keyphrases