Login / Signup
Utilisation de la corrélation pondérée dans un processus de détection d'intrusions.
Fabien Autrel
Salem Benferhat
Frédéric Cuppens
Published in:
Ann. des Télécommunications (2004)
Keyphrases
</>
intrusion detection
intrusion detection system
network security
anomaly detection
topic models
network traffic
information systems
network intrusion detection
abnormal behavior
low false alarm rate
malicious attacks
network attacks
social networks
decision making
image segmentation