An optimization process to identify outliers generated by intrusion detection systems

Fatma Hachmi, Khadouja Boujenfa, Mohamed Limam
  • Security and Communication Networks, May 2015, Wiley
  • DOI: 10.1002/sec.1271

The authors haven't finished explaining this publication. If you are the author, sign in to claim or explain your work.

Read Publication

http://dx.doi.org/10.1002/sec.1271

The following have contributed to this page: Mrs fatma hachmi

In partnership with: