Login / Signup
A Clustering-Based Anomaly Intrusion Detector for a Host Computer.
Sang Hyun Oh
Won Suk Lee
Published in:
IEICE Trans. Inf. Syst. (2004)
Keyphrases
</>
host computer
intrusion detection
anomaly detection
intrusion detection system
network traffic
data transfer
data storage
data mining
signal acquisition
field programmable gate array
industry standard
low cost
relational databases
machine learning
real time
computer networks
efficient implementation