Constructing attack scenarios through correlation of intrusion alerts

Abstract
No abstract available

This publication has 2 references indexed in Scilit: