Login / Signup
A comprehensive framework to simulate network attacks and challenges.
Egemen K. Çetinkaya
Dan Broyles
Amit Dandekar
Sripriya Srinivasan
James P. G. Sterbenz
Published in:
ICUMT (2010)
Keyphrases
</>
information systems
intrusion detection
data mining
data management