Mining in a Data-Flow Environment: Experience in Network Intrusion Detection.
Wenke LeeSalvatore J. StolfoKui W. MokPublished in: KDD (1999)
Keyphrases
- data flow
- network intrusion detection
- intrusion detection
- anomaly detection
- database machine
- network intrusion
- control flow
- network anomaly detection
- fraud detection
- systolic array
- artificial immune
- intrusion detection system
- object oriented
- data mining
- data transfer
- object oriented software
- network traffic
- machine learning
- database
- process model
- data mining techniques
- database systems
- information systems
- information retrieval
- real world