Sign in

A New Log Audit Model to Improve the Effectiveness of Network Security Research.

Guofeng WuLiliang ZhengDingzhi Lu
Published in: WISM (3) (2011)
Keyphrases
  • network security
  • intrusion detection
  • probabilistic model
  • email
  • intrusion detection system
  • databases
  • real world
  • object recognition
  • supervised learning
  • computer systems