Old Web
English
Sign In
Acemap
>
Paper
>
An Approach to Represent and Transform Application Specific Constraints for an Intrusion Detection System.
An Approach to Represent and Transform Application Specific Constraints for an Intrusion Detection System.
2020
Ayesha Babar
Keywords:
Intrusion detection system
constraint transformation
Distributed computing
constraint
Computer science
application specific
Correction
Source
Cite
Save
Machine Reading By IdeaReader
21
References
0
Citations
NaN
KQI
[]