Login / Signup
Application of a distributed data mining approach to network intrusion detection.
Jerzy W. Bala
Sung Baik
Ali Hadjarian
B. K. Gogia
Chris Manthorne
Published in:
AAMAS (2002)
Keyphrases
</>
network intrusion detection
intrusion detection
distributed systems
anomaly detection
computer vision
fraud detection
network intrusion
data sets
intrusion detection system
database systems
bayesian networks
knowledge discovery
mobile agents