Gregory Bosman

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Classical ways of intrusion analysis from textual communication log files are either AI-based (such as by combinations of data mining with various techniques of machine learning), or they are based on regular expressions (such as the scanners implemented in the 'CISCO boxes'). Whereas AI-based heuristics are not analytically exact, methods based on regular(More)
  • 1