Sign in

Security modeling and analysis of a self-cleansing intrusion tolerance technique.

Iman El MirDong Seong KimAbdelkrim Haqiq
Published in: IAS (2015)
Keyphrases
  • network security
  • statistical analysis
  • machine learning
  • intrusion detection
  • data sets
  • decision making
  • anomaly detection
  • quantitative analysis