A discussion on ``Detection of intrusions in information systems by sequential change-point methods by Tartakovsky, Rozovskii, Blažek, and Kim

From MaRDI portal
Publication:5966160