Science and Education Publishing
From Scientific Research to Knowledge
Submission
Browse by Subjects
Search
Journal Home
For Authors
Online Submission
Current Issue
Archive
About Us
Table 2. Mapping of Various Attacks with Anomalies
From
Big Data in Intrusion Detection Systems and Intrusion Prevention Systems
Lidong Wang
Journal of Computer Networks
.
2017
, 4(1), 48-55 doi:10.12691/jcn-4-1-5
Previous
Table
2
of 4 (
Tables index
)
Next