The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection.
Richard LippmannSeth E. WebsterDouglas StetsonPublished in: RAID (2002)
Keyphrases
- network intrusion detection
- intrusion detection
- anomaly detection
- security vulnerabilities
- network intrusion
- network anomaly detection
- intrusion detection system
- artificial immune
- fraud detection
- network traffic
- information security
- computer systems
- software development
- network intrusions
- security risks
- social network analysis
- text categorization
- multi class
- active learning
- network attacks
- pairwise
- network traffic data
- information systems