Login / Signup
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.
Liang Lu
Reihaneh Safavi-Naini
Jeffrey Horton
Willy Susilo
Published in:
ACNS (2007)
Keyphrases
</>
intrusion detection
intrusion detection system
probabilistic model
anomaly detection
network traffic
network intrusion detection
bayesian networks
data sets
databases
feature extraction
query expansion
ranking scheme
network intrusions