Login / Signup
Detecting past and present intrusions through vulnerability-specific predicates.
Ashlesha Joshi
Samuel T. King
George W. Dunlap
Peter M. Chen
Published in:
SOSP (2005)
Keyphrases
</>
intrusion detection
user defined
data sets
multiscale
search algorithm
intrusion detection system
low false alarm rate
database
databases
information retrieval
high level
artificial neural networks
network traffic