Login / Signup

Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems.

Chuanxi CaiShue MeiWeijun Zhong
Published in: Inf. Technol. Manag. (2019)
Keyphrases
  • intrusion prevention
  • intrusion detection
  • intrusion detection system
  • anomaly detection
  • computer systems
  • machine learning
  • knowledge discovery
  • multistage
  • network traffic
  • network intrusion detection systems