Abendroth, Jörg
2006-08-17
2006-08-17
2006-08-17
http://hdl.handle.net/2003/22795
10.17877/DE290R-8682
en
Intrusion Detection
004
New Intrusion Detection Strategies by the use of Partial Outsourcing
conference contribution