Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 DBLP:journals/igpl/WunderlichRLH22
%A Wunderlich, Sarah
%A Ring, Markus
%A Landes, Dieter
%A Hotho, Andreas
%D 2022
%J Log. J. IGPL
%K
%N 2
%P 239--251
%R 10.1093/jigpal/jzaa058
%T The Impact of Different System Call Representations on Intrusion Detection
%U https://doi.org/10.1093/jigpal/jzaa058
%V 30
@article{DBLP:journals/igpl/WunderlichRLH22,
added-at = {2023-12-14T15:38:49.000+0100},
author = {Wunderlich, Sarah and Ring, Markus and Landes, Dieter and Hotho, Andreas},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://www.bibsonomy.org/bibtex/2a410ee6c7d6dae7bc994f3c55d0f51b4/admin},
doi = {10.1093/jigpal/jzaa058},
interhash = {edc896ea4e7f5a40aebbb36c6d8e7cc8},
intrahash = {a410ee6c7d6dae7bc994f3c55d0f51b4},
journal = {Log. J. {IGPL}},
keywords = {},
number = 2,
pages = {239--251},
timestamp = {2023-12-14T15:38:49.000+0100},
title = {The Impact of Different System Call Representations on Intrusion Detection},
url = {https://doi.org/10.1093/jigpal/jzaa058},
volume = 30,
year = 2022
}