Login / Signup
Application of Unbalanced Data Approach to Network Intrusion Detection.
Yueai Zhao
Junjie Chen
Published in:
DBTA (2009)
Keyphrases
</>
network intrusion detection
unbalanced data
intrusion detection
network intrusion
anomaly detection
intrusion detection system
fraud detection
data sets
feature extraction
object recognition
probabilistic model