Login / Signup

Threat-model-driven runtime adaptation and evaluation of intrusion detection system.

Martin RehákEugen StaabVolker FusenigJan StiborekMartin GrillKarel BartosMichal PechoucekThomas Engel
Published in: ICAC (2009)
Keyphrases