An optimization process to identify outliers generated by intrusion detection systems

  • An optimization process for outlier detection
  • Fatma Hachmi, Khadouja Boujenfa, Mohamed Limam
  • Security and Communication Networks, May 2015, Wiley
  • DOI: 10.1002/sec.1271

The authors haven't finished explaining this publication. If you are the author, sign in to claim or explain your work.

Read Publication

The following have contributed to this page: Mrs fatma hachmi