A discussion on ‘Detection of intrusions in information systems by sequential change-point methods’ by Tartakovsky, Rozovskii, Blažek, and Kim

2006 ◽  
Vol 3 (3) ◽  
pp. 296-298
Author(s):  
Nitis Mukhopadhyay
2006 ◽  
Vol 3 (3) ◽  
pp. 252-293 ◽  
Author(s):  
Alexander G. Tartakovsky ◽  
Boris L. Rozovskii ◽  
Rudolf B. Blažek ◽  
Hongjoong Kim

Sign in / Sign up

Export Citation Format

Share Document