Login / Signup
An evaluation of connection characteristics for separating network attacks.
Robin Berthier
Michel Cukier
Published in:
Int. J. Secur. Networks (2009)
Keyphrases
</>
network attacks
intrusion detection
information systems
network intrusion detection
database systems