Login / Signup
An analysis of signature overlaps in Intrusion Detection Systems.
Frédéric Massicotte
Yvan Labiche
Published in:
DSN (2011)
Keyphrases
</>
intrusion detection system
intrusion detection
data analysis
anomaly detection
computer networks
network security
computer systems
network intrusion detection
databases
data mining
machine learning
data model
model selection
privacy preserving
network traffic
computer security