Login / Signup
Using vulnerability information and attack graphs for intrusion detection.
Sebastian Roschke
Feng Cheng
Christoph Meinel
Published in:
IAS (2010)
Keyphrases
</>
intrusion detection
security vulnerabilities
intrusion detection system
network security
data mining
anomaly detection
real world
data processing
network traffic
information security
high detection rate