Security Protocols Protection Based on Anomaly Detection.
Abdulrahman AlharbyHideki ImaiPublished in: IEICE Trans. Inf. Syst. (2006)
Keyphrases
- anomaly detection
- security protocols
- intrusion detection
- detecting anomalies
- anomalous behavior
- computer security
- key management
- security mechanisms
- network traffic
- information security
- network anomaly detection
- network intrusion detection
- unsupervised learning
- rfid tags
- detect anomalies
- intrusion detection system
- one class support vector machines
- security requirements
- cumulative sum
- information systems
- computer networks
- access control
- data analysis
- object recognition