Login / Signup
The Use of Data Mining in the Implementation of a Network Intrusion Detection System.
John W. Sheppard
Joe Carthy
John Dunnion
Published in:
WEBIST (2005)
Keyphrases
</>
data mining
machine learning
knowledge discovery
data analysis
real world
implementation issues
multiscale
text mining
rough sets
homeland security
databases
previously unknown
implementation details
pattern mining
association rules
database systems
case study
social networks