Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

"Analyzing Log Files for Postmortem Intrusion Detection."

Karen A. García et al. (2012)

Details and statistics

DOI: 10.1109/TSMCC.2012.2217325

access: closed

type: Journal Article

metadata version: 2020-05-21