Login / Signup
A Threat-Aware Anomaly-Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms.
Subramanian Neelakantan
Shrisha Rao
Published in:
ICDCN (2009)
Keyphrases
</>
false positives
network structure
wireless sensor networks
domain specific
peer to peer
computer networks
social networks
information systems
data processing
network traffic
communication networks
false alarms
network model