Login / Signup
Using Hash Table to Extract Real-Time Online Network Traffic Features for Hardware IDS.
Mohamed Ibrahiem Amer
Tarek S. Sobh
Gouda Ismail Mohamed
Published in:
Inf. Secur. J. A Glob. Perspect. (2012)
Keyphrases
</>
network traffic
intrusion detection system
intrusion detection
anomaly detection
hash table
image features
feature extraction
feature space
traffic data
data model
knowledge discovery
normal traffic
network intrusion detection