@dblp

On the symbiosis of specification-based and anomaly-based detection.

, , and . Comput. Secur., 29 (2): 253-268 (2010)

Links and resources

Tags