Misuse-based detection of Z-Wave network attacks.
Jonathan D. FullerBenjamin W. P. RamseyMason RiceJohn M. PecarinaPublished in: Comput. Secur. (2017)
Keyphrases
- network attacks
- intrusion detection system
- intrusion detection
- network intrusion detection
- anomaly detection
- network security
- network intrusions
- detection method
- computer networks
- misuse detection
- object detection
- dos attacks
- detection algorithm
- network traffic
- false positives
- learning algorithm
- computer systems
- data mining techniques
- data warehouse
- high dimensional