Can intrusion detection implementation be adapted to end-user capabilities?

Patricia A.H. Williams, Renji John Mathew

Research output: Contribution to conferencePaper

Original languageEnglish
Publication statusPublished - 2008
Externally publishedYes
EventProceedings of the 6th Australian Information Security Management Conference -
Duration: 1 Dec 2006 → …

Conference

ConferenceProceedings of the 6th Australian Information Security Management Conference
Period1/12/06 → …

Cite this

Williams, P. A. H., & Mathew, R. J. (2008). Can intrusion detection implementation be adapted to end-user capabilities?. Paper presented at Proceedings of the 6th Australian Information Security Management Conference, .