Login / Signup
X Through the Firewall, and Other Application Relay.
G. Winfield Treese
Alec Wolman
Published in:
USENIX Summer (1993)
Keyphrases
</>
intrusion detection
data sets
feature selection
data structure
cooperative