Login / Signup
Design and implementation of a misused intrusion detection system using autonomous and mobile agents.
Dalila Boughaci
Kamel Ider
Sofiane Yahiaoui
Published in:
EATIS (2007)
Keyphrases
</>
mobile agents
intrusion detection system
distributed intrusion detection
intrusion detection
network security
computer networks
data analysis
distributed systems
anomaly detection
intelligent agents
client server
databases
machine learning
mobile computing
data mining
unsupervised learning