Login / Signup
Immunity-Based Approaches for Self-Monitoring in Distributed Intrusion Detection System.
Yuji Watanabe
Yoshiteru Ishida
Published in:
KES (2003)
Keyphrases
</>
alternative approaches
digital libraries
objective function
hidden markov models
strengths and weaknesses
data sets
neural network
computer vision
knowledge base
preprocessing
machine learning algorithms