Characterizing Evaluation Practicesof Intrusion Detection Methodsfor Smartphones.
Abdullah J. AlzahraniNataliav StakhanoaHugo GonzalezAli A. GhorbaniPublished in: J. Cyber Secur. Mobil. (2014)
Keyphrases
- intrusion detection
- anomaly detection
- intrusion detection system
- network traffic
- network security
- network intrusion detection
- information security
- high detection rate
- artificial immune
- detecting anomalous
- computer security
- cyber security
- network intrusion
- false positives and false negatives
- network attacks
- alert correlation
- network intrusions
- data mining
- security vulnerabilities
- stream data mining
- distributed intrusion detection
- computer networks
- maximum likelihood
- feature selection