Learning Patterns from Unix Process Execution Traces for Intrusion Detection.
774c5fb4d8f87da96428a0aba0863ebb08b7dc6c1ac0ebbdac5fdf4f01a312da
© 2024 Packet Storm. All rights reserved.