Using Hilbert-Huang Transform to Characterize Intrusions in Computer Networks.
Weihong WangKai PeiXiaogang JinPublished in: ICNC (5) (2007)
Keyphrases
- computer networks
- intrusion detection system
- hilbert huang transform
- network security
- intrusion detection
- network traffic
- feature extraction
- anomaly detection
- empirical mode decomposition
- computer systems
- communication networks
- data mining techniques
- databases
- computer vision
- data processing
- object recognition
- pattern recognition
- intrinsic mode functions
- frequency hopping