@dblp

Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems.

, , and . ICCSA (3), volume 3045 of Lecture Notes in Computer Science, page 706-714. Springer, (2004)

Links and resources

Tags