Login / Signup

Analyzing Log Files for Postmortem Intrusion Detection.

Karen A. GarcíaRaúl MonroyLuis A. TrejoJ. Carlos Mex-PereraEduardo Aguirre-Bermúdez
Published in: IEEE Trans. Syst. Man Cybern. Part C (2012)
Keyphrases