HARM: Hacker Attack Representation Method.
Péter KárpátiAndreas L. OpdahlGuttorm SindrePublished in: ICSOFT (Selected Papers) (2010)
Keyphrases
- high accuracy
- preprocessing
- fully automatic
- feature representation
- experimental evaluation
- high precision
- computational complexity
- computational cost
- clustering method
- synthetic data
- segmentation method
- similarity measure
- optimization method
- power analysis
- tree structure
- smart card
- data sets
- intrusion detection
- computationally efficient
- model selection
- medical images
- input image
- support vector machine
- significant improvement
- prior knowledge
- k means