Back to Results
First PageMeta Content
NP-complete problems / Morphisms / Alert correlation / Graph isomorphism / Subgraph isomorphism problem / Matching / Tree / Mathematics / Theoretical computer science / Graph theory


Learning Attack Strategies from Intrusion Alerts ∗ Peng Ning
Add to Reading List

Document Date: 2011-11-09 13:26:02


Open Document

File Size: 173,93 KB

Share Result on Facebook
UPDATE