"Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector.
Kymie M. C. TanRoy A. MaxionPublished in: IEEE Symposium on Security and Privacy (2002)
Keyphrases
- intrusion detection
- anomaly detection
- negative selection algorithm
- intrusion detection system
- network security
- network traffic
- anomalous behavior
- detecting anomalies
- information security
- computer vision
- network intrusion
- network intrusion detection
- decision making
- artificial intelligence
- face recognition
- alert correlation
- pre trained
- data mining
- infrared
- detection method
- detection algorithm
- search algorithm