Login / Signup
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics.
Asaf Shabtai
Yuval Fledel
Yuval Elovici
Yuval Shahar
Published in:
J. Comput. Virol. (2010)
Keyphrases
</>
network security
model selection
intrusion detection
computer networks
database
machine learning
image sequences
data structure
probabilistic model