Login / Signup

Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics.

Asaf ShabtaiYuval FledelYuval EloviciYuval Shahar
Published in: J. Comput. Virol. (2010)
Keyphrases
  • network security
  • model selection
  • intrusion detection
  • computer networks
  • database
  • machine learning
  • image sequences
  • data structure
  • probabilistic model