Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat.
Sohail SafdarMohd Fadzil HassanRehan AkbarMuhammad Aasim QureshiPublished in: ICWCA (2012)
Keyphrases
- data sources
- intrusion detection
- management system
- intrusion detection and prevention
- intrusion detection system
- real time
- data sets
- data flow
- website
- neural network
- countermeasures
- architectural design
- layered architecture
- multimedia
- relational databases
- low level
- learning algorithm
- database
- software engineering
- anomaly detection
- software architecture