1 Table of Contents: ...CHAPTER TWO: Study Methodology Introduction; Comprehensive Literature Search; Document...

2
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Detection -- Sensing Attacks in Computers Networks with Hidden Markov Models -- Frequent and Common Item Set...