Login / Signup
Achieving automated intrusion response: a prototype implementation.
Maria Papadaki
Steven Furnell
Published in:
Inf. Manag. Comput. Secur. (2006)
Keyphrases
</>
intrusion detection
data sets
data driven
computer systems
fully automated
implementation details
database systems
computer assisted
intrusion detection system
efficient implementation
network security
semi automated