Replicating and Sharing Computer Security Laboratory Environments.
Kara L. NanceBrian HayRonald DodgeJames WrubelStephen D. BurdAlessandro F. SeazzuPublished in: HICSS (2009)
Keyphrases
- computer security
- intrusion detection
- computer systems
- network security
- information security
- anomaly detection
- intrusion detection system
- network intrusion detection
- dynamic environments
- remote access
- information sharing
- real world
- classification accuracy
- training set
- decision making
- pattern recognition
- database systems
- computer vision
- databases
- data sets