Login / Signup

Selecting the minimal set of preferred responses to counter detected intrusions.

Maheedhar GunasekharanSamik BasuGanesh Ram Santhanam
Published in: CISRC (2017)
Keyphrases
  • intrusion detection
  • intrusion detection system
  • anomaly detection
  • network security
  • automatically detected
  • genetic algorithm
  • real time
  • learning algorithm
  • case study
  • multi agent
  • wide range
  • network intrusions