Login / Signup
Visualization of Misuse-Based Intrusion Detection: Application to Honeynet Data.
Urko Zurutuza
Enaitz Ezpeleta
Álvaro Herrero
Emilio Corchado
Published in:
SOCO (2011)
Keyphrases
</>
intrusion detection
intrusion detection system
anomaly detection
data sets
data analysis
data mining techniques
data processing
data sources
network traffic
database
pairwise
dimensionality reduction
learning algorithm
machine learning
data mining
network security
streaming data
network intrusion