Login / Signup

Using data-independence in the analysis of intrusion detection systems.

Gordon Thomas RohrmairGavin Lowe
Published in: Theor. Comput. Sci. (2005)
Keyphrases
  • intrusion detection system
  • intrusion detection
  • anomaly detection
  • computer networks
  • data analysis
  • network security
  • network traffic
  • computer security
  • data independence