Login / Signup

Application of a distributed data mining approach to network intrusion detection.

Jerzy W. BalaSung BaikAli HadjarianB. K. GogiaChris Manthorne
Published in: AAMAS (2002)
Keyphrases