Login / Signup
Survivability analysis of mobile cyber physical systems with voting-based intrusion detection.
Robert Mitchell
Ing-Ray Chen
Published in:
IWCMC (2011)
Keyphrases
</>
intrusion detection
anomaly detection
intrusion detection system
network security
cyber security
network traffic
network intrusion detection
data analysis
information security
computer networks
detecting anomalous
real world
context aware
data acquisition
alert correlation
intrusion prevention