Keyphrases
- intrusion detection
- intrusion detection system
- dependency directed backtracking
- constraint satisfaction
- search algorithm
- network security
- anomaly detection
- search space
- abnormal behavior
- search tree
- constraint propagation
- network traffic
- artificial intelligence
- malicious attacks
- constraint satisfaction problems
- upper bound
- default reasoning
- clause learning
- knowledge discovery
- decision making
- backtracking search
- information retrieval
- network intrusions