Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework Chapter uri icon

start page

  • 142

end page

  • 157