Inproceedings,

Generating realistic workloads for network intrusion detection systems.

, , and .
WOSP, page 207-215. ACM, (2004)

Meta data

Tags

Users

  • @deynard
  • @dblp

Comments and Reviews