Login / Signup
Collaborative Intrusion Detection leveraging Blockchain and Pluggable Authentication Modules.
Vikram Kanth
Ashley McAbee
Murali Tummala
John C. McEachen
Published in:
HICSS (2020)
Keyphrases
</>
intrusion detection
intrusion detection system
anomaly detection
network security
network traffic
network intrusion detection
false positives and false negatives
information security
cyber security
artificial immune
data mining
detecting anomalous
high detection rate
network intrusion
computer security
network traffic data
data mining techniques
fraud detection
real world
security requirements
alert correlation
network attacks
stream data mining
distributed intrusion detection