Login / Signup
Building an Intrusion-Detection System to Detect Suspicious Process Behavior.
Andreas Wespi
Hervé Debar
Published in:
Recent Advances in Intrusion Detection (1999)
Keyphrases
</>
intrusion detection system
anomaly detection
intrusion detection
normal behavior
network traffic
network security
computer networks
misuse detection
detection algorithm
database
computer security
databases
real world
alert correlation