Application-based anomaly intrusion detection with dynamic information flow analysis.
Wes MasriAndy PodgurskiPublished in: Comput. Secur. (2008)
Keyphrases
- flow analysis
- dynamically changing
- information sources
- information content
- partial information
- dynamic environments
- prior knowledge
- decision support
- computer systems
- higher level
- information flow
- raw data
- smart card
- web documents
- database
- information extraction
- domain knowledge
- case study
- web services
- genetic algorithm
- neural network
- data sets