A Typical Set Method of Intrusion Detection Technology Base on Computer Audit Data

Sorry, there's nothing here.

Cite this paper

@inproceedings{Duan2007ATS, title={A Typical Set Method of Intrusion Detection Technology Base on Computer Audit Data}, author={Xuetao Duan and Chunfu Jia and Yubing Fu}, booktitle={CIS}, year={2007} }