Keyphrases
- network intrusion detection
- intrusion detection
- fraud detection
- network intrusion
- anomaly detection
- artificial immune
- network anomaly detection
- intrusion detection system
- network traffic
- real world
- information retrieval
- compute intensive
- databases
- social networks
- social network analysis
- computer networks
- network security
- data processing
- data model