Login / Signup
Modeling Host Status Transition for Network Intrusion Detection.
Mira Kwak
Dong-Sub Cho
Published in:
Security and Management (2004)
Keyphrases
</>
network intrusion detection
anomaly detection
intrusion detection
network intrusion
network anomaly detection
fraud detection
artificial immune
network traffic
database
databases
real world
data mining
social networks
information systems
data analysis
intrusion detection system