Intrusion signature creation via clustering anomalies
Keyword(s):
2019 ◽
Vol 27
(2)
◽
pp. 29-39