Setting optimal intrusion-detection thresholds
- 31 December 1995
- journal article
- Published by Elsevier in Computers & Security
- Vol. 14 (7) , 621-631
- https://doi.org/10.1016/0167-4048(95)00017-8
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- Statistical foundations of audit trail analysis for the detection of computer misuseIEEE Transactions on Software Engineering, 1993
- Intrusion detection: Its role and validationComputers & Security, 1992
- Password cracking: a game of witsCommunications of the ACM, 1989
- Stalking the wily hackerCommunications of the ACM, 1988
- An Intrusion-Detection ModelIEEE Transactions on Software Engineering, 1987