Domain Specific Intended Use Evaluation Method: Intrusion Detection Specific Intended Use Evaluation Method.
Albert ParkPublished in: ISA (2009)
Keyphrases
- evaluation method
- intrusion detection
- domain specific
- evaluation methods
- anomaly detection
- network security
- intrusion detection system
- evaluation model
- detecting anomalous
- credit risk
- network intrusion detection
- network traffic
- network intrusion
- information security
- high detection rate
- computer security
- analytic hierarchy process
- listed companies
- fuzzy comprehensive evaluation method
- unsupervised learning
- databases
- cyber security
- fraud detection
- data processing
- data sets