![]() | Only 14 pages are availabe for public view |
Abstract Because computer security in today’s networks is one of the fastest expanding areas of the computer industry, protecting resources from intruders is an arduous task that must be automated to be efficient and responsive. Most intrusion-detection systems currently rely on some type of centralized processing to analyze the data necessary to detect and intruder in real time. |