Login / Signup

A three-stage analysis of IDS for critical infrastructures.

Lorena CazorlaCristina AlcarazJavier López
Published in: Comput. Secur. (2015)
Keyphrases
  • statistical analysis
  • information technology
  • real time
  • social networks
  • data analysis
  • data acquisition
  • information security
  • risk analysis