Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems
Crossref DOI link: https://doi.org/10.1007/s10799-018-0291-6
Published Online: 2018-09-22
Published Print: 2019-06
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Cai, Chuanxi
Mei, Shue
Zhong, Weijun
Funding for this research was provided by:
NSF (71071033)
Text and Data Mining valid from 2018-09-22
Article History
First Online: 22 September 2018