Login / Signup

Using artificial anomalies to detect unknown and known network intrusions.

Wei FanMatthew MillerSalvatore J. StolfoWenke LeePhilip K. Chan
Published in: Knowl. Inf. Syst. (2004)
Keyphrases