Login / Signup
University systems security logging: who is doing it and how far can they go?
Virginia E. Rezmierski
Marshall R. Seese Jr.
Nathaniel St. Clair II
Published in:
Comput. Secur. (2002)
Keyphrases
</>
security systems
data sets
distributed systems
building blocks
intrusion detection
database
information sharing
information security
case study
expert systems
intelligent systems
complex systems
application level
public safety
information assurance