Login / Signup

A Distributed and Privacy-Preserving Method for Network Intrusion Detection.

Fatiha BenaliNadia BennaniGabriele GianiniStelvio Cimato
Published in: OTM Conferences (2) (2010)
Keyphrases
  • privacy preserving
  • network intrusion detection
  • similarity measure
  • information systems
  • anomaly detection
  • peer to peer
  • detection algorithm
  • privacy protection
  • privacy preserving data mining