arrow Communications of the ACM
arrow Volume 42 , Issue 7 (1999)

access SIGs conferences publication page subscription page

Testing and evaluating computer intrusion detection systems
Pages 53-61

Robert Durst, Terrence Champion, Brian Witten, Eric Miller and Luigi Spagnuolo

metadata:   index terms  
rule rule rule rule
full text:   pdf 215 KB

back to top
blue HR


Categories and Subject Descriptors:
Computing Milieux -Management of Computing and Information Systems - Security and Protection (K.6.5): Unauthorized access (e.g., hacking, phreaking); Computer Systems Organization -Computer-Communication Networks - General (C.2.0): Security and protection (e.g., firewalls);

General Terms:
Management, Security

blue HR