Login / Signup

Intrusion signature creation via clustering anomalies.

Gilbert HendryShanchieh Jay Yang
Published in: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security (2008)
Keyphrases