Login / Signup

Host based attack detection using system calls.

Jestin JoyAnita John
Published in: CCSEIT (2012)
Keyphrases
  • attack detection
  • multistage
  • intrusion detection system
  • attack scenarios
  • cyber attacks
  • product recommendation
  • dynamic programming
  • text classification
  • information sources
  • intrusion detection