EM Rajaallah, SA Chamkar, S Ain El Hayat - … -18) Held on October 17–18 …, 2019 - Springer
… how misuse detection and anomaly-based detection works … which is undiscovered software
hole that could be exploited … configured to know the range of IP addresses. It is supposed to …