Login / Signup

Design and implementation of acceptance monitor for building scalable intrusion tolerant system.

Rong WangFeiyi WangGregory T. Byrd
Published in: ICCCN (2001)
Keyphrases
  • design process
  • data mining
  • case study
  • monitoring system