Article,

Intruder tracing through dynamic extension of a security domain.

, and .
J. Network and Computer Applications, 25 (2): 69-91 (2002)

Meta data

Tags

Users

  • @dblp

Comments and Reviews