Login / Signup
Demonstration: A cloud-control system equipped with intrusion detection and mitigation.
Fatemeh Akbarian
William Tärneberg
Emma Fitzgerald
Maria Kihl
Published in:
Electron. Commun. Eur. Assoc. Softw. Sci. Technol. (2022)
Keyphrases
</>
intrusion detection
control system
intrusion detection system
cloud computing
anomaly detection
network security
network intrusion detection
artificial immune
network traffic
real time
computer security
network intrusion
information security
risk management
high detection rate
detecting anomalous
false positives and false negatives
data mining
virtual machine
data center
cyber security
network attacks
probabilistic model
outlier mining
object detection
intrusion prevention