|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 2 scholarly publications.
Computer intrusion detection
Statistical modeling
Databases
Network security
Computing systems
Data mining
Detection and tracking algorithms