作者: Steven Noel , Duminda Wijesekera , Charles Youman
DOI: 10.1007/978-1-4615-0953-0_1
关键词:
摘要: … of intrusion detection: general detection strategy (misuse … been applied to signature-based intrusion detection for many years… That is, the intrusion detection system has attack signatures …