Volume: 2 Issue: 2, 6/28/13

Year: 2013

Articles

 

1. Addressing Information Security Risks by Adopting Standards

Research Article

4. Methods for post-processing of alerts in intrusion detection: A survey