Login / Signup
Host based attack detection using system calls.
Jestin Joy
Anita John
Published in:
CCSEIT (2012)
Keyphrases
</>
attack detection
multistage
intrusion detection system
attack scenarios
cyber attacks
product recommendation
dynamic programming
text classification
information sources
intrusion detection