Can intrusion detection implementation be adapted to end-user capabilities?

Patricia A.H. Williams, Renji John Mathew

Research output: Contribution to conferencePaperpeer-review

Original languageEnglish
Publication statusPublished - 2008
Externally publishedYes
EventProceedings of the 6th Australian Information Security Management Conference -
Duration: 1 Dec 2006 → …

Conference

ConferenceProceedings of the 6th Australian Information Security Management Conference
Period1/12/06 → …

Cite this