Login / Signup
Towards Identifying True Threat from Network Security Data.
Zhitang Li
Jie Lei
Li Wang
Dong Li
Yang-ming Ma
Published in:
PAISI (2007)
Keyphrases
</>
network security
data sets
data analysis
computer systems
data processing
data points
knowledge discovery
database
information systems
data sources
data mining techniques
lightweight
intrusion detection
computer networks
data transfer