Login / Signup
An evaluation technique for network intrusion detection systems.
Dana Zhang
Christopher Leckie
Published in:
Infoscale (2006)
Keyphrases
</>
network intrusion detection systems
machine learning
learning algorithm
evaluation methods
database
data sets
feature extraction
association rules
active learning
intrusion detection
evaluation method
evaluation model