Login / Signup
A Process State-Transition Analysis and Its Application to Intrusion Detection.
Nittida Nuansri
Samar Singh
Tharam S. Dillon
Published in:
ACSAC (1999)
Keyphrases
</>
intrusion detection
state transition
anomaly detection
network traffic
intrusion detection system
network security
network intrusion detection
data sets
outlier mining
cyber security
information security
network intrusions
detecting anomalous
input output
knowledge discovery
relational databases
databases