Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer New York
2001
|
Ausgabe: | 1st ed. 2001 |
Schriftenreihe: | Information Science and Statistics
|
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one's computer against intrusions. The first task was to find a book from which to teach. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection |
Beschreibung: | 1 Online-Ressource (XVII, 333 p) |
ISBN: | 9781475734584 |
DOI: | 10.1007/978-1-4757-3458-4 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047064448 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2001 |||| o||u| ||||||eng d | ||
020 | |a 9781475734584 |9 978-1-4757-3458-4 | ||
024 | 7 | |a 10.1007/978-1-4757-3458-4 |2 doi | |
035 | |a (ZDB-2-SCS)978-1-4757-3458-4 | ||
035 | |a (OCoLC)1227478485 | ||
035 | |a (DE-599)BVBBV047064448 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 519.5 |2 23 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Marchette, David J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer Intrusion Detection and Network Monitoring |b A Statistical Viewpoint |c by David J. Marchette |
250 | |a 1st ed. 2001 | ||
264 | 1 | |a New York, NY |b Springer New York |c 2001 | |
300 | |a 1 Online-Ressource (XVII, 333 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Information Science and Statistics | |
520 | |a In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one's computer against intrusions. The first task was to find a book from which to teach. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection | ||
650 | 4 | |a Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences | |
650 | 4 | |a Probability Theory and Stochastic Processes | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Information Storage and Retrieval | |
650 | 4 | |a Pattern Recognition | |
650 | 4 | |a Statistics | |
650 | 4 | |a Probabilities | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Information storage and retrieval | |
650 | 4 | |a Pattern recognition | |
650 | 0 | 7 | |a Statistik |0 (DE-588)4056995-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Nachrichtenverkehrstheorie |0 (DE-588)4191600-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computervirus |0 (DE-588)4214774-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Monitoring |g Informatik |0 (DE-588)4522632-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Monitoring |g Informatik |0 (DE-588)4522632-5 |D s |
689 | 0 | 4 | |a Nachrichtenverkehrstheorie |0 (DE-588)4191600-1 |D s |
689 | 0 | 5 | |a Computervirus |0 (DE-588)4214774-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 2 | |a Statistik |0 (DE-588)4056995-0 |D s |
689 | 1 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781441929372 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780387952819 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475734591 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4757-3458-4 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471559 | ||
966 | e | |u https://doi.org/10.1007/978-1-4757-3458-4 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182062472626176 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Marchette, David J. |
author_facet | Marchette, David J. |
author_role | aut |
author_sort | Marchette, David J. |
author_variant | d j m dj djm |
building | Verbundindex |
bvnumber | BV047064448 |
classification_rvk | ST 273 ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-1-4757-3458-4 (OCoLC)1227478485 (DE-599)BVBBV047064448 |
dewey-full | 519.5 |
dewey-hundreds | 500 - Natural sciences and mathematics |
dewey-ones | 519 - Probabilities and applied mathematics |
dewey-raw | 519.5 |
dewey-search | 519.5 |
dewey-sort | 3519.5 |
dewey-tens | 510 - Mathematics |
discipline | Informatik Mathematik |
discipline_str_mv | Informatik Mathematik |
doi_str_mv | 10.1007/978-1-4757-3458-4 |
edition | 1st ed. 2001 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04530nmm a2200793zc 4500</leader><controlfield tag="001">BV047064448</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2001 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781475734584</subfield><subfield code="9">978-1-4757-3458-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4757-3458-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4757-3458-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227478485</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064448</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">519.5</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Marchette, David J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer Intrusion Detection and Network Monitoring</subfield><subfield code="b">A Statistical Viewpoint</subfield><subfield code="c">by David J. Marchette</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2001</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer New York</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 333 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information Science and Statistics</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one's computer against intrusions. The first task was to find a book from which to teach. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Probability Theory and Stochastic Processes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Storage and Retrieval</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pattern Recognition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Statistics </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Probabilities</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pattern recognition</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Statistik</subfield><subfield code="0">(DE-588)4056995-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Nachrichtenverkehrstheorie</subfield><subfield code="0">(DE-588)4191600-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Monitoring</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4522632-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Monitoring</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4522632-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Nachrichtenverkehrstheorie</subfield><subfield code="0">(DE-588)4191600-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Statistik</subfield><subfield code="0">(DE-588)4056995-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781441929372</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780387952819</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475734591</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4757-3458-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471559</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4757-3458-4</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064448 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:35Z |
institution | BVB |
isbn | 9781475734584 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471559 |
oclc_num | 1227478485 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XVII, 333 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Springer New York |
record_format | marc |
series2 | Information Science and Statistics |
spelling | Marchette, David J. Verfasser aut Computer Intrusion Detection and Network Monitoring A Statistical Viewpoint by David J. Marchette 1st ed. 2001 New York, NY Springer New York 2001 1 Online-Ressource (XVII, 333 p) txt rdacontent c rdamedia cr rdacarrier Information Science and Statistics In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one's computer against intrusions. The first task was to find a book from which to teach. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences Probability Theory and Stochastic Processes Cryptology Computer Communication Networks Information Storage and Retrieval Pattern Recognition Statistics Probabilities Data encryption (Computer science) Computer communication systems Information storage and retrieval Pattern recognition Statistik (DE-588)4056995-0 gnd rswk-swf Nachrichtenverkehrstheorie (DE-588)4191600-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Computervirus (DE-588)4214774-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Monitoring Informatik (DE-588)4522632-5 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Monitoring Informatik (DE-588)4522632-5 s Nachrichtenverkehrstheorie (DE-588)4191600-1 s Computervirus (DE-588)4214774-8 s DE-604 Statistik (DE-588)4056995-0 s Erscheint auch als Druck-Ausgabe 9781441929372 Erscheint auch als Druck-Ausgabe 9780387952819 Erscheint auch als Druck-Ausgabe 9781475734591 https://doi.org/10.1007/978-1-4757-3458-4 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Marchette, David J. Computer Intrusion Detection and Network Monitoring A Statistical Viewpoint Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences Probability Theory and Stochastic Processes Cryptology Computer Communication Networks Information Storage and Retrieval Pattern Recognition Statistics Probabilities Data encryption (Computer science) Computer communication systems Information storage and retrieval Pattern recognition Statistik (DE-588)4056995-0 gnd Nachrichtenverkehrstheorie (DE-588)4191600-1 gnd Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd Computervirus (DE-588)4214774-8 gnd Computersicherheit (DE-588)4274324-2 gnd Monitoring Informatik (DE-588)4522632-5 gnd |
subject_GND | (DE-588)4056995-0 (DE-588)4191600-1 (DE-588)4070085-9 (DE-588)4011144-1 (DE-588)4214774-8 (DE-588)4274324-2 (DE-588)4522632-5 |
title | Computer Intrusion Detection and Network Monitoring A Statistical Viewpoint |
title_auth | Computer Intrusion Detection and Network Monitoring A Statistical Viewpoint |
title_exact_search | Computer Intrusion Detection and Network Monitoring A Statistical Viewpoint |
title_exact_search_txtP | Computer Intrusion Detection and Network Monitoring A Statistical Viewpoint |
title_full | Computer Intrusion Detection and Network Monitoring A Statistical Viewpoint by David J. Marchette |
title_fullStr | Computer Intrusion Detection and Network Monitoring A Statistical Viewpoint by David J. Marchette |
title_full_unstemmed | Computer Intrusion Detection and Network Monitoring A Statistical Viewpoint by David J. Marchette |
title_short | Computer Intrusion Detection and Network Monitoring |
title_sort | computer intrusion detection and network monitoring a statistical viewpoint |
title_sub | A Statistical Viewpoint |
topic | Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences Probability Theory and Stochastic Processes Cryptology Computer Communication Networks Information Storage and Retrieval Pattern Recognition Statistics Probabilities Data encryption (Computer science) Computer communication systems Information storage and retrieval Pattern recognition Statistik (DE-588)4056995-0 gnd Nachrichtenverkehrstheorie (DE-588)4191600-1 gnd Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd Computervirus (DE-588)4214774-8 gnd Computersicherheit (DE-588)4274324-2 gnd Monitoring Informatik (DE-588)4522632-5 gnd |
topic_facet | Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences Probability Theory and Stochastic Processes Cryptology Computer Communication Networks Information Storage and Retrieval Pattern Recognition Statistics Probabilities Data encryption (Computer science) Computer communication systems Information storage and retrieval Pattern recognition Statistik Nachrichtenverkehrstheorie Rechnernetz Datensicherung Computervirus Computersicherheit Monitoring Informatik |
url | https://doi.org/10.1007/978-1-4757-3458-4 |
work_keys_str_mv | AT marchettedavidj computerintrusiondetectionandnetworkmonitoringastatisticalviewpoint |