Skip to main content

and
  1. No Access

    Article

    Using artificial anomalies to detect unknown and known network intrusions

    Intrusion detection systems (IDSs) must be capable of detecting new and unknown attacks, or anomalies. We study the problem of building detection models for both pure anomaly detection and combined misuse and ...

    W. Fan, M. Miller, S. Stolfo, W. Lee, P. Chan in Knowledge and Information Systems (2004)

  2. No Access

    Chapter

    Message Management in Office Information Systems

    An office information system is a distributed system consisting of workstations and functionally specialized stations such as file servers and printer stations, interconnected by a communication network.(3,6) The...

    S. K. Chang, P. Chan, T. D. Donnadieu, L. Leung, F. Montenoise in Languages for Automation (1985)