Comparison of the Intrusion Detection System Rules in Relation with the SCADA Systems.
Jan VávraMartin HromadaPublished in: CSOC (2) (2016)
Keyphrases
- intrusion detection system
- intrusion detection
- network intrusion detection systems
- computer systems
- network security
- anomaly detection
- cyber security
- computer networks
- network intrusion detection
- databases
- distributed systems
- network traffic
- distributed intrusion detection
- data mining techniques
- feature selection
- information retrieval
- critical infrastructure
- cyber attacks
- database