Login / Signup

Immunity-Based Approaches for Self-Monitoring in Distributed Intrusion Detection System.

Yuji WatanabeYoshiteru Ishida
Published in: KES (2003)
Keyphrases
  • alternative approaches
  • digital libraries
  • objective function
  • hidden markov models
  • strengths and weaknesses
  • data sets
  • neural network
  • computer vision
  • knowledge base
  • preprocessing
  • machine learning algorithms