Login / Signup

An evaluation of connection characteristics for separating network attacks.

Robin BerthierMichel Cukier
Published in: Int. J. Secur. Networks (2009)
Keyphrases
  • network attacks
  • intrusion detection
  • information systems
  • network intrusion detection
  • database systems