Login / Signup

A Three-Stage Process to Detect Outliers and False Positives Generated by Intrusion Detection Systems.

Fatma HachmiKhadouja BoujenfaMohamed Limam
Published in: CIT/IUCC/DASC/PICom (2015)
Keyphrases