Login / Signup
Selecting the minimal set of preferred responses to counter detected intrusions.
Maheedhar Gunasekharan
Samik Basu
Ganesh Ram Santhanam
Published in:
CISRC (2017)
Keyphrases
</>
intrusion detection
intrusion detection system
anomaly detection
network security
automatically detected
genetic algorithm
real time
learning algorithm
case study
multi agent
wide range
network intrusions