Evaluating the Strengths and Weaknesses of Mining Audit Data for Automated Models for Intrusion Detection in <i>Tcpdump</i> and Basic Security Module Data
Details
The content you want is available to Zendy users.Already have an account? Click here. to sign in.