logodl
arrow Communications of the ACM
 
arrow Volume 42 , Issue 7 (1999)

access SIGs conferences publication page subscription page

Testing and evaluating computer intrusion detection systems
Pages 53-61

Robert Durst, Terrence Champion, Brian Witten, Eric Miller and Luigi Spagnuolo

metadata:   index terms  
rule rule rule rule
full text:   pdf 215 KB



back to top
blue HR

INDEX TERMS

Categories and Subject Descriptors:
Computing Milieux -Management of Computing and Information Systems - Security and Protection (K.6.5): Unauthorized access (e.g., hacking, phreaking); Computer Systems Organization -Computer-Communication Networks - General (C.2.0): Security and protection (e.g., firewalls);

General Terms:
Management, Security




blue HR