Login / Signup
Evaluating Different Metric Configurations of an Evolutionary Wrapper for Attack Detection.
Javier Maldonado
María Cristina Riff
Published in:
ICTAI (2019)
Keyphrases
</>
attack detection
multistage
intrusion detection system
feature selection
attack scenarios
data analysis
sufficient conditions
information sharing
cyber attacks
product recommendation