Please ensure Javascript is enabled for purposes of website accessibility
Return to Article Details Intrusion Detection Systems. Model and implementation of module reacting on intrusion to computer system Download Download PDF