Login / Signup
Experimental Research on DFA-Based MLML IDS Security Evaluation.
Hongbin Wang
Zhiyi Fang
Simon Fong
Yain-Whar Si
Liyang Liu
Published in:
ITNG (2011)
Keyphrases
</>
intrusion detection
real world
security requirements
database
data mining
information systems
case study
network security