Login / Signup

Implementing the Intrusion Detection Exchange Protocol.

Tim BuchheimMichael ErlingerBenjamin S. FeinsteinGregory A. MatthewsRoy PollockJoseph BetserAndy Walther
Published in: ACSAC (2001)
Keyphrases