An empirical comparison of monitoring algorithms for access anomaly detection
An empirical comparison of monitoring algorithms for access anomaly detection
1989
Anne Dinning
Details
First published
1989
OL Work ID
OL12263182W
Find this book
Open Library