Sign in

Experimental Research on DFA-Based MLML IDS Security Evaluation.

Hongbin WangZhiyi FangSimon FongYain-Whar SiLiyang Liu
Published in: ITNG (2011)
Keyphrases
  • intrusion detection
  • real world
  • security requirements
  • database
  • data mining
  • information systems
  • case study
  • network security