Login / Signup
Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data.
Huw Read
Andrew Blyth
Published in:
ECIW (2005)
Keyphrases
</>
intrusion detection system
data analysis
data collection
data processing
data sets
training data
computer systems
database
knowledge discovery
data mining techniques
intrusion detection
network security
real world
learning algorithm
data model