Triple Modular Redundancy Optimization for Threshold Determination in Intrusion Detection Systems.
Ivan BabicAleksandar MiljkovicMilan CabarkapaVojkan NikolicAleksandar DordevicMilan RandelovicDragan M. RandelovicPublished in: Symmetry (2021)
Keyphrases
- intrusion detection system
- intrusion detection
- network security
- anomaly detection
- computer networks
- network traffic
- computer security
- network intrusion detection
- network intrusion detection systems
- attack detection
- computer systems
- cyber security
- distributed intrusion detection
- security architecture
- alert correlation
- malicious activities
- databases
- unsupervised learning
- supervised learning
- normal behavior
- semi supervised
- attack scenarios
- object recognition
- network intrusions