Login / Signup
Using data-independence in the analysis of intrusion detection systems.
Gordon Thomas Rohrmair
Gavin Lowe
Published in:
Theor. Comput. Sci. (2005)
Keyphrases
</>
intrusion detection system
intrusion detection
anomaly detection
computer networks
data analysis
network security
network traffic
computer security
data independence