Login / Signup
Conversion methods for symbolic features: A comparison applied to an intrusion detection problem.
Elena Hernández-Pereira
Juan A. Suárez-Romero
Oscar Fontenla-Romero
Amparo Alonso-Betanzos
Published in:
Expert Syst. Appl. (2009)
Keyphrases
</>
intrusion detection
anomaly detection
data sets
intrusion detection system
databases
machine learning
image segmentation
false positives
active learning
computational cost
classification accuracy
network traffic
network security
computer security