Trust-based Solution for Robust Self-configuration of Distributed Intrusion Detection Systems.
Karel BartosMartin RehákPublished in: ECAI (2012)
Keyphrases
- intrusion detection system
- computer networks
- intrusion detection
- distributed intrusion detection
- network security
- network intrusion detection
- anomaly detection
- network traffic
- computer security
- databases
- computer systems
- intrusion prevention
- distributed systems
- cyber attacks
- alert correlation
- network intrusion detection systems
- model selection
- multistage
- network intrusion