Applying Mining Fuzzy Association Rules to Intrusion Detection Based on Sequences of System Calls
2005 ◽
pp. 826-835
◽
Keyword(s):
2000 ◽
Vol 15
(8)
◽
pp. 687-703
◽