"Classifying Host Anomalies: Using Ontology in Information Security Monitoring."

Suja Ramachandran et al. (2011)

Details and statistics

DOI: 10.4018/978-1-60960-123-2.CH006

access: closed

type: Part in Book or Collection

metadata version: 2017-05-16