Login / Signup

Using vulnerability information and attack graphs for intrusion detection.

Sebastian RoschkeFeng ChengChristoph Meinel
Published in: IAS (2010)
Keyphrases
  • intrusion detection
  • security vulnerabilities
  • intrusion detection system
  • network security
  • data mining
  • anomaly detection
  • real world
  • data processing
  • network traffic
  • information security
  • high detection rate