Intrusion-detection for incident-response, using a military battlefield-intelligence process

Autor: Yuill, J *, Wu, F, Settle, J, Gong, F, Forno, R, Huang, M, Asbery, J
Zdroj: In Computer Networks 2000 34(4):671-697
Databáze: ScienceDirect