Login / Signup
Design and performance analysis of various feature selection methods for anomaly-based techniques in intrusion detection system.
Sushant Kumar Pandey
Published in:
Secur. Priv. (2019)
Keyphrases
</>
intrusion detection
intrusion detection system
anomaly detection
network traffic
network intrusion detection
network security
real world
data mining techniques
computer systems
computer networks
attack detection