Login / Signup
Hierarchical Attention-Based Anomaly Detection Model for Embedded Operating Systems.
Mellitus O. Ezeme
Qusay H. Mahmoud
Akramul Azim
Published in:
RTCSA (2018)
Keyphrases
</>
anomaly detection
operating system
intrusion detection
probabilistic model
network intrusion detection
network traffic
negative selection algorithm
data mining techniques
computer systems
anomalous behavior
feature selection
maximum likelihood