![Security / Intrusion detection system / Anomaly detection / Vulnerability / Attack / Rootkit / Threat / Multics / Snort / Computer security / Computer network security / Cyberwarfare Security / Intrusion detection system / Anomaly detection / Vulnerability / Attack / Rootkit / Threat / Multics / Snort / Computer security / Computer network security / Cyberwarfare](https://www.pdfsearch.io/img/57da143ebb2474e6360f3c9fd9450da9.jpg) Date: 2014-02-03 21:40:14Security Intrusion detection system Anomaly detection Vulnerability Attack Rootkit Threat Multics Snort Computer security Computer network security Cyberwarfare | | IJIS: 14–35 / Digital Object Identifier (DOIs102070100001 Intrusion and intrusion detection John McHugh CERT Coordination Center∗ , Software Engineering Institute, Carnegie Mellon University, Add to Reading ListSource URL: www.icir.orgDownload Document from Source Website File Size: 366,32 KBShare Document on Facebook
|