Applying Mining Fuzzy Association Rules to Intrusion Detection Based on Sequences of System Calls

Author(s):  
Guiling Zhang
Sign in / Sign up

Export Citation Format

Share Document