Skip to main content

Part of the book series: Advances in Information Security ((ADIS,volume 14))

  • 620 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science + Business Media, Inc. Boston

About this chapter

Cite this chapter

(2005). Conclusions. In: Intrusion Detection and Correlation. Advances in Information Security, vol 14. Springer, Boston, MA. https://doi.org/10.1007/0-387-23399-7_10

Download citation

  • DOI: https://doi.org/10.1007/0-387-23399-7_10

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-23398-7

  • Online ISBN: 978-0-387-23399-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics