![]() ![]() ![]() | ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Note: Links lead to the DBLP on the Web. A. Ghoting Matthew Eric Otey , Srinivasan Parthasarathy , A. Ghoting, G. Li , S. Narravula , D. Panda : Towards NIC-based intrusion detection. KDD 2003 : 723-728 1 [ 1 ] 2 [ 1 ] 3 [ 1 ] 4 [ 1 ] 5 [ 1 ] ![]() ©2004 Association for Computing Machinery |