Login / Signup
Performance comparison of intrusion detection systems and application of machine learning to Snort system.
Syed Ali Raza Shah
Biju Issac
Published in:
Future Gener. Comput. Syst. (2018)
Keyphrases
</>
intrusion detection system
intrusion detection
network intrusion detection
anomaly detection
network security
computer networks
network traffic
distributed intrusion detection
network intrusion detection systems
alert correlation
cyber security
computer security
computer systems
cyber attacks
network intrusion
denial of service attacks
attack detection
malicious activities
data mining techniques
data analysis
data mining