Login / Signup
Hiding Intrusions: From the Abnormal to the Normal and Beyond.
Kymie M. C. Tan
John McHugh
Kevin S. Killourhy
Published in:
Information Hiding (2002)
Keyphrases
</>
abnormal behavior
anomaly detection
abnormal events
high risk
intrusion detection
normal behavior
intrusion detection system
network security
misuse detection
neural network
machine learning
data mining
image segmentation
network traffic
network intrusion detection