Login / Signup
A Three-Stage Process to Detect Outliers and False Positives Generated by Intrusion Detection Systems.
Fatma Hachmi
Khadouja Boujenfa
Mohamed Limam
Published in:
CIT/IUCC/DASC/PICom (2015)
Keyphrases
</>
false positives
intrusion detection system
intrusion detection
anomaly detection
network security
false positive rate
network traffic
false negative
number of false positives
detection rate
computer security
databases
information systems
clustering algorithm
active learning
computer networks