Using data-independence in the analysis of intrusion detection systems
From MaRDI portal
Recommendations
Cited in
(8)- scientific article; zbMATH DE number 3793928 (Why is no real title available?)
- A log analyzing system for Linux LASL
- Data-flow dependency-based trusted recovery method
- scientific article; zbMATH DE number 2080964 (Why is no real title available?)
- scientific article; zbMATH DE number 1980968 (Why is no real title available?)
- Towards a theory of intrusion detection
- scientific article; zbMATH DE number 1690179 (Why is no real title available?)
- Towards an information-theoretic framework for analyzing intrusion detection systems
This page was built for publication: Using data-independence in the analysis of intrusion detection systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q557891)