Login / Signup

Prioritizing intrusion analysis using Dempster-Shafer theory.

Loai ZomlotSathya Chandran SundaramurthyKui LuoXinming OuSiva Raj Rajagopalan
Published in: AISec (2011)
Keyphrases
  • dempster shafer theory
  • data analysis
  • neural network
  • multiscale
  • network security
  • real time
  • computer vision
  • pattern recognition
  • evolutionary algorithm
  • low level
  • intrusion detection system