Login / Signup
An efficient signature-based strategy for supporting inexact filtering in information filtering systems.
Ye-In Chang
Lee-Wen Huang
Jun-Hong Shen
Yi-Siang Wang
Published in:
Expert Syst. Appl. (2009)
Keyphrases
</>
computer vision
artificial intelligence
network traffic
anomaly detection
intrusion detection
information filtering
optimal strategy
database
search engine
decision trees
evolutionary algorithm
denoising
computationally efficient
network intrusion detection