On Cloud Data Transaction Security Using Encryption and Intrusion Detection.
Mahmoud JazzarPublished in: J. Cases Inf. Technol. (2017)
Keyphrases
- intrusion detection
- network security
- data sets
- intrusion detection system
- anomaly detection
- data processing
- data mining techniques
- information security
- network traffic data
- network traffic
- data sources
- data analysis
- database
- computer security
- cyber security
- sensitive data
- network intrusion detection
- feature selection
- data mining
- normal behavior
- artificial immune
- data streams