Sign in

The Design and Implementation of Host-Based Intrusion Detection System.

Ying LinYan ZhangYang-jia Ou
Published in: IITSI (2010)
Keyphrases
  • intrusion detection system
  • intrusion detection
  • design process
  • network security
  • information retrieval
  • anomaly detection
  • image segmentation
  • data mining techniques
  • computer networks