Login / Signup
Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods.
Mahbod Tavallaee
Natalia Stakhanova
Ali A. Ghorbani
Published in:
IEEE Trans. Syst. Man Cybern. Part C (2010)
Keyphrases
</>
gold standard
benchmark datasets
evaluation criteria
data sets
databases
computational cost
social networks
image segmentation
face recognition
feature extraction
preprocessing
significant improvement