Fengmin Gong

Suggest Changes
Learn More
  • Mboupda Moyo, Achille Atsa Etoundi, +15 authors Mark L. Krotoski
  • 2016
Intrusion detection techniques have appeared to inspect all of the inbound and outbound network activities, and to identify suspicious patterns that indicate an attack that might compromise an(More)
  • 1