Login / Signup

Static Detection of Sources of Dynamic Anomalies in a Network of Referential Integrity Restrictions.

Laura C. RiveroJorge Horacio DoornDaniel Loureiro
Published in: SAC (1) (2000)
Keyphrases
  • network attacks
  • anomaly detection
  • detect anomalies
  • peer to peer
  • intrusion detection
  • databases
  • data sources
  • wireless sensor networks
  • software engineering
  • referential integrity