Login / Signup

Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection.

Emilie Lundin BarseErland Jonsson
Published in: ACSAC (2004)
Keyphrases