Login / Signup

Application of Unbalanced Data Approach to Network Intrusion Detection.

Yueai ZhaoJunjie Chen
Published in: DBTA (2009)
Keyphrases
  • network intrusion detection
  • unbalanced data
  • intrusion detection
  • network intrusion
  • anomaly detection
  • intrusion detection system
  • fraud detection
  • data sets
  • feature extraction
  • object recognition
  • probabilistic model