Login / Signup

A formal approach to sensor placement and configuration in a network intrusion detection system.

Marco RolandoMatteo RossiNiccolò SanaricoDino Mandrioli
Published in: SESS@ICSE (2006)
Keyphrases