Boosting GSHADE Capabilities: New Applications and Security in Malicious Setting.
Julien BringerOthmane El OmriConstance MorelHervé ChabannePublished in: SACMAT (2016)
Keyphrases
- malicious users
- information security
- insider attacks
- security requirements
- intrusion detection
- malicious attacks
- access control
- malicious activities
- security issues
- security systems
- learning algorithm
- network security
- security level
- computer security
- information systems
- security analysis
- security mechanisms
- statistical databases
- security policies
- ensemble methods
- security model
- ensemble learning
- base classifiers
- detect malicious