Last update: Thu Jun 20 02:01:00 MDT 2019
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Lundin:2000:ABI,
author = "Emilie Lundin and Erland Jonsson",
title = "Anomaly-based intrusion detection: privacy concerns
and other problems",
journal = j-COMP-NET-AMSTERDAM,
volume = "34",
number = "4",
pages = "623--640",
month = oct,
year = "2000",
CODEN = "????",
ISSN = "1389-1286 (print), 1872-7069 (electronic)",
ISSN-L = "1389-1286",
bibdate = "Sat Oct 21 17:47:56 MDT 2000",
bibsource = "http://www.elsevier.com/locate/issn/13891286;
http://www.math.utah.edu/pub/tex/bib/compnetamsterdam2000.bib",
URL = "http://www.elsevier.nl/gej-ng/10/15/22/49/25/30/abstract.html;
http://www.elsevier.nl/gej-ng/10/15/22/49/30/30/article.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://www.sciencedirect.com/science/journal/13891286",
}
Related entries
- anomaly-based,
45(2)175
- detection,
32(4)389,
32(4)419,
32(4)433,
32(4)449,
32(4)487,
34(4)541,
34(4)547,
34(4)579,
34(4)597,
34(4)605,
34(4)641,
35(1)77,
37(1)55,
40(4)537,
42(6)717,
45(2)175,
46(5)605,
48(2)215,
48(2)235,
48(5)717,
50(9)1247,
50(10)1547,
51(2)426,
51(5)1233,
51(5)1256,
51(6)1444,
51(12)3448,
51(13)3750,
51(13)3828,
51(13)3935,
51(18)5036,
52(5)998,
52(9)1745,
53(3)265,
53(3)279,
53(5)668,
53(6)835,
53(6)864,
53(11)1903,
53(14)2458,
53(15)2601,
53(15)2617
- intrusion,
34(4)541,
34(4)547,
34(4)579,
34(4)597,
34(4)605,
34(4)641,
45(2)175,
51(4)1151,
51(5)1233,
51(5)1275,
51(5)1334,
53(14)2458
- other,
32(2)185,
32(5)587,
34(4)605,
34(4)671,
35(2)223,
35(4)411,
35(4)457,
35(4)473,
36(1)1,
36(2)137,
36(2)169,
36(2)311,
37(6)747,
38(2)137,
39(1)21,
39(2)151,
39(4)347,
39(5)609,
40(1)181,
46(5)605,
47(5)765,
50(3)422
- privacy,
51(16)4679,
52(15)3007,
52(18)3433
- problem,
34(3)341,
38(4)531,
39(6)729,
42(2)199,
45(1)55,
48(6)856,
50(10)1581,
51(14)3989,
52(4)795,
52(9)1721,
52(11)2205,
52(17)3218,
53(5)680