Evaluation of the Architecture Alternatives for Real-time Intrusion Detection Systems for Connected Vehicles.
Mubark B. JedhJian Kai LeeLotfi Ben OthmanePublished in: CoRR (2022)
Keyphrases
- real time
- intrusion detection system
- intrusion detection
- network security
- anomaly detection
- distributed intrusion detection
- network traffic
- computer networks
- network intrusion detection
- computer security
- security architecture
- quality of service
- intrusion prevention
- object recognition
- cyber security
- cyber attacks
- network intrusion detection systems
- denial of service attacks
- computer systems
- training data
- query processing
- network intrusion
- alert correlation
- semi supervised
- network intrusions
- data mining techniques
- databases