Learning attack strategies from intrusion alerts

dc.contributor.authorNing, Peng
dc.contributor.authorXu, D.
dc.date.accessioned2007-01-04T19:55:24Z
dc.date.available2007-01-04T19:55:24Z
dc.date.issued2003
dc.format.extent194729 bytes
dc.format.extent417176 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/postscript
dc.identifier.uriftp://ftp.ncsu.edu/pub/unity/lockers/ftp/csc_anon/tech/2003/TR-2003-16.ps.Z
dc.identifier.urihttp://www.lib.ncsu.edu/resolver/1840.4/766
dc.language.isoen
dc.publisherNorth Carolina State University. Dept. of Computer Science
dc.relation.ispartofseriesTR-2003-16
dc.relation.ispartofseriesDepartment of Computer Science Technical Report
dc.titleLearning attack strategies from intrusion alerts
dc.typeTechnical report

Files

Original bundle

Now showing 1 - 2 of 2
No Thumbnail Available
Name:
TR-2003-16.pdf
Size:
190.17 KB
Format:
Adobe Portable Document Format
No Thumbnail Available
Name:
TR-2003-16.ps
Size:
407.4 KB
Format:
Postscript Files