Login / Signup

Using Artificial Anomalies to Detect Unknown and Known Network Intrusions.

Wei FanMatthew MillerSalvatore J. StolfoWenke LeePhilip K. Chan
Published in: ICDM (2001)
Keyphrases