Login / Signup

Log Correlation for Intrusion Detection: A Proof of Concept.

Cristina L. AbadJed TaylorCigdem SengulWilliam YurcikYuanyuan ZhouKenneth E. Rowe
Published in: ACSAC (2003)
Keyphrases