Login / Signup

A framework for the evaluation of the theoretical threat coverage provided by intrusion detection systems.

Gideon Creech
Published in: MilCIS (2017)
Keyphrases
  • intrusion detection system
  • intrusion detection
  • network traffic
  • computer security
  • computer networks
  • network security
  • query processing
  • anomaly detection
  • normal behavior
  • image segmentation
  • training data