Sciweavers

ACSAC
2004
IEEE
14 years 4 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson