Login / Signup
Real-time anomaly detection over VMware performance data using storm.
Mohiuddin Solaimani
Latifur Khan
Bhavani M. Thuraisingham
Published in:
IRI (2014)
Keyphrases
</>
anomaly detection
data sets
data analysis
data processing
intrusion detection
network intrusion detection
training data
input data
face recognition
computer systems
correlation analysis
network intrusion
anomalous behavior