Return to Article Details
Intrusion Detection Systems. Model and implementation of a knowledge base of intrusions into the computer system
Download
Download PDF