Login / Signup
Provenance-based Intrusion Detection: Opportunities and Challenges.
Xueyuan Han
Thomas F. J.-M. Pasquier
Margo I. Seltzer
Published in:
TaPP (2018)
Keyphrases
</>
intrusion detection
intrusion detection system
anomaly detection
network intrusion detection
network security
network traffic
high detection rate
network intrusion
detecting anomalous
stream data mining
false positives and false negatives
cyber security
computer security
data mining
network intrusions
artificial immune
data mining techniques
intrusion prevention
fraud detection
computer networks
information security
credit card fraud detection
network attacks
network traffic data
high dimensional
feature space
network intrusion detection systems
information retrieval
real world
intrusion detection and prevention