Two statebased approaches to Program-based Anomaly Detection.
b38d534f4f8ae5b2fe6bbb553e56150a2abdc6766ade8b6b6e7527a53c30d580
USTAT Real Time Intrusion Detection for Unix.
8046c9ee66fcba459b430fcfbee8378dcec39ec3d3a4f0998c7010241a62e4f6
© 2022 Packet Storm. All rights reserved.