A discussion on “Detection of intrusions in information systems by sequential change-point methods” by Tartakovsky, Rozovskii, Blažek, and Kim
2006 ◽
Vol 3
(3)
◽
pp. 325-326
◽
2006 ◽
Vol 3
(3)
◽
pp. 315-319
◽
2006 ◽
Vol 3
(3)
◽
pp. 252-293
◽