Login / Signup
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report.
Christoph C. Michael
Anup K. Ghosh
Published in:
Recent Advances in Intrusion Detection (2000)
Keyphrases
</>
intrusion detection
data sets
data mining techniques
finite automata
intrusion detection system
data processing
database
network intrusion
network security
data points
data analysis
data sources
xml documents
network intrusion detection
training data
information systems
data mining
real world