Login / Signup
Characterizing Evaluation Practicesof Intrusion Detection Methodsfor Smartphones.
Abdullah J. Alzahrani
Nataliav Stakhanoa
Hugo Gonzalez
Ali A. Ghorbani
Published in:
J. Cyber Secur. Mobil. (2014)
Keyphrases
</>
intrusion detection
anomaly detection
intrusion detection system
network traffic
network security
network intrusion detection
information security
high detection rate
artificial immune
detecting anomalous
computer security
cyber security
network intrusion
false positives and false negatives
network attacks
alert correlation
network intrusions
data mining
security vulnerabilities
stream data mining
distributed intrusion detection
computer networks
maximum likelihood
feature selection