Personal information

Activities

Works (1)

Analyzing log files for postmortem intrusion detection

IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews
2012 | Journal article
EID:

2-s2.0-84871764609

Contributors: GarcĂ­a, K.A.; Monroy, R.; Trejo, L.A.; Mex-Perera, C.; Aguirre, E.
Source: Self-asserted source
Eduardo Aguirre via Scopus - Elsevier