2000 | ||
---|---|---|
1 | EE | Jim Yuill, Shyhtsun Felix Wu, J. Settle, Fengmin Gong, R. Forno, Ming-Yuh Huang, J. Asbery: Intrusion-detection for incident-response, using a military battlefield-intelligence process. Computer Networks 34(4): 671-697 (2000) |
1 | J. Asbery | [1] |
2 | Fengmin Gong | [1] |
3 | Ming-Yuh Huang | [1] |
4 | J. Settle | [1] |
5 | Shyhtsun Felix Wu | [1] |
6 | Jim Yuill | [1] |