Login / Signup
Attack profiles to derive data observations, features, and characteristics of cyber attacks.
Nong Ye
Harish Bashettihalli
Toni Farley
Published in:
Inf. Knowl. Syst. Manag. (2006)
Keyphrases
</>
data processing
data sources
data collection
data analysis
knowledge discovery
computational intelligence
intrusion detection
cyber attacks