Login / Signup

Mining TCP/IP packets to detect stepping-stone intrusion.

Jianhua YangShou-Hsuan Stephen Huang
Published in: Comput. Secur. (2007)
Keyphrases