Inproceedings,

Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems.

, , and .
ICCSA (3), volume 3045 of Lecture Notes in Computer Science, page 706-714. Springer, (2004)

Meta data

Tags

Users

  • @dblp

Comments and Reviews