Login / Signup
Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems.
Chuanxi Cai
Shue Mei
Weijun Zhong
Published in:
Inf. Technol. Manag. (2019)
Keyphrases
</>
intrusion prevention
intrusion detection
intrusion detection system
anomaly detection
computer systems
machine learning
knowledge discovery
multistage
network traffic
network intrusion detection systems