Keyphrases
- anomaly detection
- intrusion detection
- anomalous behavior
- log analysis
- network traffic
- network intrusion detection
- intrusion prevention
- detecting anomalies
- detect anomalies
- network anomaly detection
- negative selection algorithm
- connectionist systems
- one class support vector machines
- real world
- log data
- retrieval systems
- web search