Applied Cryptography and Network Security
From MaRDI portal
Publication:5899205
DOI10.1007/11767480zbMATH Open1151.93429OpenAlexW4211109874MaRDI QIDQ5899205FDOQ5899205
Authors: Ahren Studer, Chenxi Wang
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11767480
Recommendations
- A flow based slow and fast scan detection system
- Information and Communications Security
- Detector sherLOCK: Enhancing TRW with bloom filters under memory and performance constraints
- Network anomaly detection with incomplete audit data
- Detection of intrusions in information systems by sequential change-point methods
Cited In (4)
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5899205)