文
论文分享
演练场
杂货铺
论文推荐
字
编辑器下载
登录
注册
Mohd. Noor Md. Sap
发表
To detect misuse and anomaly attacks through rule induction analysis and fuzzy methods
Abdul Hanan Abdullah, Surat Srinoy, Witcha Chimphlee, 2006 .