Login / Signup
A framework for the evaluation of the theoretical threat coverage provided by intrusion detection systems.
Gideon Creech
Published in:
MilCIS (2017)
Keyphrases
</>
intrusion detection system
intrusion detection
network traffic
computer security
computer networks
network security
query processing
anomaly detection
normal behavior
image segmentation
training data