Login / Signup
An adaptive network intrusion detection approach for the cloud environment.
Hui-Hao Chou
Sheng-De Wang
Published in:
ICCST (2015)
Keyphrases
</>
network intrusion detection
intrusion detection
anomaly detection
network intrusion
fraud detection
network anomaly detection
artificial immune
intrusion detection system
network traffic
network attacks
database
feature selection
network traffic data
network security
network intrusions