Login / Signup

Modeling network attacks for scenario construction.

Safaa O. Al-MamoryHongli ZhangAyad R. Abbas
Published in: IJCNN (2008)
Keyphrases
  • network attacks
  • intrusion detection
  • real world
  • network intrusion detection
  • network security