|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 1 scholarly publication.
Data mining
Computer intrusion detection
Databases
Internet
Computer security
Mining
Network security