![]() ![]() ![]() ![]() ![]() ![]() ![]() | |||||||||
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Testing and evaluating computer intrusion detection systems
Pages 53-61
|
Categories and Subject Descriptors:
Computing Milieux -Management of Computing and Information Systems - Security and Protection (K.6.5): Unauthorized access (e.g., hacking, phreaking);
Computer Systems Organization -Computer-Communication Networks - General (C.2.0): Security and protection (e.g., firewalls);
General Terms:
Management,
Security
![]() |
![]() |
![]() The Digital Library is published by the Association for Computing Machinery. Copyright © 1999, 2000 ACM, Inc.
This page was last updated Thu, 10 Aug. 2000 12:56 -0500
.
|
![]() |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |