Login / Signup

Network intrusion detection based on system calls and data mining.

Xinguang TianXueqi ChengMiyi DuanRui LiaoHong ChenXiaojuan Chen
Published in: Frontiers Comput. Sci. China (2010)
Keyphrases