Abstract
A logging maturity and decision model for the selection of intrusion detection cyber security solutions
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
https://doi.org/10.1016/j.cose.2024.103844
Journal: Computers & Security | Publication Date: Apr 9, 2024 |
Citations: 3 | License type: cc-by |
A logging maturity and decision model for the selection of intrusion detection cyber security solutions
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.