Login / Signup

Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods.

Mahbod TavallaeeNatalia StakhanovaAli A. Ghorbani
Published in: IEEE Trans. Syst. Man Cybern. Part C (2010)
Keyphrases
  • gold standard
  • benchmark datasets
  • evaluation criteria
  • data sets
  • databases
  • computational cost
  • social networks
  • image segmentation
  • face recognition
  • feature extraction
  • preprocessing
  • significant improvement