Inproceedings,

Intrusion signature creation via clustering anomalies.

, and .
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6973 of SPIE Proceedings, page 69730C. SPIE, (2008)

Meta data

Tags

Users

  • @dblp

Comments and Reviews