![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Sodiya A.S. Longe H.O.D. Akinwale A.T.
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.13, Iss.1, 2005-01, pp. : 72-80
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
An anomaly intrusion detection method by clustering normal user behavior
Computers and Security, Vol. 22, Iss. 7, 2003-10 ,pp. :