Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

"Using MIB II Variables for Network Intrusion Detection."

Xinzhou Qin et al. (2002)

Details and statistics

DOI: 10.1007/978-1-4615-0953-0_6

access: closed

type: Part in Book or Collection

metadata version: 2019-07-26