Keyphrases
- intrusion detection
- game theory
- network attacks
- network intrusion
- intrusion prevention
- network traffic
- network traffic data
- intrusion detection system
- network intrusion detection
- intrusion detection and prevention
- network security
- network intrusions
- game theoretic
- anomaly detection
- network intrusion detection systems
- cooperative
- normal behavior
- cyber attacks
- computer networks
- computer security
- misuse detection
- worm detection
- fictitious play
- nash equilibrium
- high detection rate
- detecting anomalous
- multi agent systems
- data mining
- dos attacks
- security vulnerabilities
- cyber security
- statistical physics
- nash equilibria
- fraud detection
- information security
- malicious traffic
- resource allocation
- data mining techniques
- solution concepts
- distributed intrusion detection
- traffic data
- real world
- machine learning