Login / Signup
A Distributed and Privacy-Preserving Method for Network Intrusion Detection.
Fatiha Benali
Nadia Bennani
Gabriele Gianini
Stelvio Cimato
Published in:
OTM Conferences (2) (2010)
Keyphrases
</>
privacy preserving
network intrusion detection
similarity measure
information systems
anomaly detection
peer to peer
detection algorithm
privacy protection
privacy preserving data mining