By Topic

Research on System Logs Collection and Analysis Model of the Network and Information Security System by Using Multi-agent Technology

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
4 Author(s)
Shi Shengyan ; Sch. of Control & Comput. Eng., North China Electr. Power Univ., Beijing, China ; Shen Xiaoliu ; Zhao Jianbao ; Ma Xinke