Login / Signup
Specifying and using intrusion masking models to process distributed operations.
Meng Yu
Peng Liu
Wanyu Zang
Published in:
J. Comput. Secur. (2005)
Keyphrases
</>
intrusion detection
intrusion detection system
anomaly detection
data mining
process model
distributed environment
machine learning
metamodel
cooperative
concurrent processes
databases
processing units
diffusion process
communication cost
statistical models
social networks
search engine
neural network